cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
RussN
Level 8
Report Inappropriate Content
Message 1 of 7

Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution

Greetings,

The ePO server has pushed unsigned kernel modules to my shiny new RH EL 9 host.

This host is secured ... and will NOT load unsigned kernel modules.

I do not understand why the kernel modules have not been signed by the author, i.e., Trellix.

Worse still, I have been unable to locate anyone that can even provide hashes for the kernel modules.

Mind you, I am NOT trying to find instructions on how to sign kernel modules myself.

I am trying to find any reason that I should trust that the file files that have been pushed to the machine by the ePO server have not been tampered with.

Can anyone point me to anything that can serve as a basis of trust for the kernel modules?

1 Solution

Accepted Solutions
RussN
Level 8
Report Inappropriate Content
Message 7 of 7

Re: Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution
6 Replies
Pravas
Employee
Employee
Report Inappropriate Content
Message 2 of 7

Re: Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution

Hi @RussN ,

Could you please confirm if there are any deployment task assigned to the system in question?

Thanks

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

RussN
Level 8
Report Inappropriate Content
Message 3 of 7

Re: Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution

Sorry.  I have no idea.

ueno
Employee
Employee
Report Inappropriate Content
Message 4 of 7

Re: Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution

Hi @RussN,


As you know, the currently released ENSL kernel modules are not signed.

ENSL does not have the function to check the integrity of installed kernel modules. Therefore, if you want to check the integrity of installed kernel modules, I think it is necessary to build another stand-alone system with the same configuration and check the hash value of each kernel module to see if there are any differences.

The kernel modules used in ENSL are listed under the following directories for each kernel used in LinuxOS.

/var/McAfee/ens/esp/aac/kernel
/var/McAfee/ens/esp/fileaccess/kernel

For reference, for stand-alone installations, the rpm files which will be installed integrity can be checked before installation using the method described in the following guide.

[Verify the signature on RPM-based systems]
https://docs.trellix.com/bundle/endpoint-security-v10-7-13-installation-guide-linux/page/GUID-979445...

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
RussN
Level 8
Report Inappropriate Content
Message 5 of 7

Re: Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution

it strikes me as odd, no, more than odd---ALARMING---that a company whose business is computer *security* does not only fail to sign the kernel modules they sell to their customers, but not even provide a "primitive" solution like a web page posting the sha256 hashes of said modules.

Ya'll should be ashamed of yourselves!

Bad show!   <SMH>

 

   Where can I get the RPMs for a stand-alone install?  At least the RPM's can be validated.

 

Oh ... and while creating an entirely separate machine with all the necessary stuff to compile a kernel module sounds like an excellent way for me to spend a day ... you can't even vouch for the integrity of the source code that has been installed---which invalidates the suggestion.

(By the way, I suspect that the compiler or linker will stuff version info and/or a timestamp into the resulting .ko file, and if so, result in a different checksum).

RussN
Level 8
Report Inappropriate Content
Message 6 of 7

Re: Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution

I see that the kernel modules are now signed by "Musarubra US LLC"

This is great news!

Unfortunately I am unable to locate the corresponding public key.

Can you provide a link to the public key (or the public key itself)?

 

 

RussN
Level 8
Report Inappropriate Content
Message 7 of 7

Re: Kernel Modules mfe_fileaccess and mfe_aac are untrustworthy

Jump to solution
You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from product experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by employees.
Join the Community
Join the Community