Fortinet white logo
Fortinet white logo

New Features

Enhance file integrity check to perform verification during system bootup 7.4.4

Enhance file integrity check to perform verification during system bootup 7.4.4

This enhancement improves upon previous BIOS-level and real-time file integrity checks by requiring the kernel to verify the signed hashes of important file-system and object files during bootup. This prevents unauthorized changes to file-systems to be mounted and other unauthorized objects to be loaded into user space on bootup.

This verification does not depend on the security level of the device. The verification will always run when the firmware image type is a GA, SA, Beta, or Top3 image. If the signed hash verification fails, the system will halt during bootup.

This enhancement supplements previous security measures to validate the firmware, AV, and IPS packages in the BIOS (see Enhance BIOS-level signature and file integrity checking), as well as performing real-time binary and executable integrity checks in user space (see Real-time file system integrity checking).

Example

Upon detection of an altered IPS library file upon bootup, the system will halt as follows:

FortiGate-60E (18:03-01.27.2017)
Ver:05000012
Serial number: FGT60ETK1804xxxx
CPU: 1000MHz
Total RAM: 2 GB
Initializing boot device...
Initializing MAC... nplite#0
Please wait for OS to boot, or press any key to display configuration menu......

Booting OS...
Reading boot image... 2891501 bytes.
Initializing firewall...
fos_ima: System Integrity check failed....   
CPU3: stopping
CPU1: stopping
CPU0: stopping
Note

The exact display in the CLI may vary depending on the model of device, security level, or reasons for the failed verification.

Enhance file integrity check to perform verification during system bootup 7.4.4

Enhance file integrity check to perform verification during system bootup 7.4.4

This enhancement improves upon previous BIOS-level and real-time file integrity checks by requiring the kernel to verify the signed hashes of important file-system and object files during bootup. This prevents unauthorized changes to file-systems to be mounted and other unauthorized objects to be loaded into user space on bootup.

This verification does not depend on the security level of the device. The verification will always run when the firmware image type is a GA, SA, Beta, or Top3 image. If the signed hash verification fails, the system will halt during bootup.

This enhancement supplements previous security measures to validate the firmware, AV, and IPS packages in the BIOS (see Enhance BIOS-level signature and file integrity checking), as well as performing real-time binary and executable integrity checks in user space (see Real-time file system integrity checking).

Example

Upon detection of an altered IPS library file upon bootup, the system will halt as follows:

FortiGate-60E (18:03-01.27.2017)
Ver:05000012
Serial number: FGT60ETK1804xxxx
CPU: 1000MHz
Total RAM: 2 GB
Initializing boot device...
Initializing MAC... nplite#0
Please wait for OS to boot, or press any key to display configuration menu......

Booting OS...
Reading boot image... 2891501 bytes.
Initializing firewall...
fos_ima: System Integrity check failed....   
CPU3: stopping
CPU1: stopping
CPU0: stopping
Note

The exact display in the CLI may vary depending on the model of device, security level, or reasons for the failed verification.