From owner-freebsd-security Tue Jul 13 11:53:44 1999 Delivered-To: freebsd-security@freebsd.org Received: from srh0710.urh.uiuc.edu (srh0710.urh.uiuc.edu [130.126.76.32]) by hub.freebsd.org (Postfix) with SMTP id 34B2314EE4 for ; Tue, 13 Jul 1999 11:53:35 -0700 (PDT) (envelope-from ftobin@uiuc.edu) Received: (qmail 93585 invoked by uid 1000); 13 Jul 1999 17:53:15 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 13 Jul 1999 17:53:15 -0000 Date: Tue, 13 Jul 1999 12:53:15 -0500 (CDT) From: Frank Tobin X-Sender: ftobin@srh0710.urh.uiuc.edu To: security@FreeBSD.ORG Subject: Re: Module magic In-Reply-To: <199907131631.MAA05152@khavrinen.lcs.mit.edu> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Garrett Wollman, at 12:31 on Tue, 13 Jul 1999, wrote: > > Are you saying that X does not work when securelevel >= 0 under > > FreeBSD? > > That is correct. X requires direct access to I/O space, which is > fundamentally incompatible with the notion of enhanced security. However, it seems, the XFree86 wants to open kmem or mem only on startup; one can start xdm and have it running fine with a functional securelevel. The only problem arises if one needs to do a server reset with Ctrl-Alt-Backspace. -- Frank Tobin "To learn what is good and what is to be www.neverending.org/~ftobin valued, those truths which cannot be shaken or changed." Myst: The Book of Atrus FreeBSD: The Power To Serve PGPenvelope = GPG and PGP5 + Pine PGP: 4F86 3BBB A816 6F0A 340F www.neverending.org/~ftobin/resources.html 6003 56FF D10A 260C 4FA3 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message