Invisible Armies

Story: Linux exploit gets around security barrierTotal Replies: 1
Author Content
phsolide

Jul 21, 2009
4:54 PM EDT
Has anybody else read Jon Evan's "Invisible Armies"?

This bug is shockingly like one mentioned in the book, on page 300 of my hardback copy. It's the second section of Chapter 10 of the "America 3 months later" division of the book.

The villain has a CD full of exploits "stolen from the military". An "undiscovered fundamental exploit" in the linux kernel exists, in the way that GCC compiles the kernel.

Kind of makes me think I should recompile my kernel with "tcc", the only other C compiler to ever compile the Linux kernel. Probably take an enormous performance hit, though.
rezendi

Jul 23, 2009
11:42 AM EDT
Hey there. Jon Evans here - stumbled across this while ego-surfing.

That fictional exploit was actually inspired by Ken Thompson's famous paper Reflections on Trusting Trust (http://cm.bell-labs.com/who/ken/trust.html) (and see also en.wikipedia.org/wiki/Backdoor_(computing)), but it's interesting, in a black-comedy life-imitating-art sort of way, to see a real live example out there in the wild.

Posting in this forum is limited to members of the group: [ForumMods, SITEADMINS, MEMBERS.]

Becoming a member of LXer is easy and free. Join Us!