From owner-freebsd-security Tue Jul 13 22:50:34 1999 Delivered-To: freebsd-security@freebsd.org Received: from cheops.anu.edu.au (cheops.anu.edu.au [150.203.76.24]) by hub.freebsd.org (Postfix) with ESMTP id 85C8614C3B for ; Tue, 13 Jul 1999 22:50:24 -0700 (PDT) (envelope-from avalon@cheops.anu.edu.au) Received: (from avalon@localhost) by cheops.anu.edu.au (8.9.1/8.9.1) id PAA25344; Wed, 14 Jul 1999 15:49:10 +1000 (EST) From: Darren Reed Message-Id: <199907140549.PAA25344@cheops.anu.edu.au> Subject: Re: Module magic To: brett@lariat.org (Brett Glass) Date: Wed, 14 Jul 1999 15:49:09 +1000 (EST) Cc: jkh@zippy.cdrom.com, gjb-freebsd@gba.oz.au, wollman@khavrinen.lcs.mit.edu, security@FreeBSD.ORG In-Reply-To: <4.2.0.58.19990713230358.044ebdb0@localhost> from "Brett Glass" at Jul 13, 99 11:07:50 pm X-Mailer: ELM [version 2.4 PL23] Content-Type: text Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org So, does XiG work with securelevel > 0 ? xdm seems to be a problem, but a solution (start xdm before the securelevel gets raised) is available. What other barriers are there to shipping with kernels that boot up `secure'? Darren To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message