Subject: Re: verified executables
To: vishal butte <vishal_butte@yahoo.co.in>
From: Brett Lymn <blymn@baesystems.com.au>
List: tech-security
Date: 02/10/2006 10:03:10
On Thu, Feb 09, 2006 at 05:51:26PM +0000, vishal butte wrote:
> 
>   please tell me the file name where the code for loading the database is present.
>

depends what you mean by this.  the loader is in:

src/sbin/veriexecctl

the pseudo device is in

src/sys/dev/verified_exec.c
    
> 
>   who can raise the securelevel.....i mean dose only administrator
> is allowed to raise the level ?

Only root can raise securelevel

>   i am confused about ..."normal boot process..."  if only administrator  is allowed to raise the securelevel then how to authenticate him during 
>   " normal boot process .."

the boot process is run as the root user.

>    
>   1) " hash of file can be added into the database only in securelevel 0."
>   that means the database file could be tampered only in securelevel
>   0 by some users other than administrator.

No - only root is allowed to load the hashes.

>   then how to secure the databse file in securelevel 0 ?
>

Make sure the console is physically secure.
    
>   2)  Can i check the contents of  in-kernel data structure ?
>   Is that implemented in /proc ?
>    

No - that facility is not available.

-- 
Brett Lymn