Date: Tue, 18 Jan 2000 13:43:07 -0800 From: Cy Schubert <cschuber@uumail.gov.bc.ca> To: Sheldon Hearn <sheldonh@uunet.co.za> Cc: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>, Omachonu Ogali <oogali@intranova.net>, Adam <bsdx@looksharp.net>, Will Andrews <andrews@TECHNOLOGIST.COM>, freebsd-security@FreeBSD.ORG Subject: Re: Parent Logging Patch for sh(1) Message-ID: <200001182143.NAA09877@passer.osg.gov.bc.ca> In-Reply-To: Your message of "Tue, 18 Jan 2000 22:15:05 %2B0200." <15540.948226505@axl.noc.iafrica.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <15540.948226505@axl.noc.iafrica.com>, Sheldon Hearn writes: > > > On Tue, 18 Jan 2000 08:05:15 PST, Cy Schubert - ITSD Open Systems Group wrote > : > > > If I may offer a half-baked idea: Why not a kernel module that > > implements the access list at execve(2) for any shell or binary. > > Did you take a look at the spy(4) module, URLs for which I posted > earlier in this thread? Somewhere between abial's and rwatson's work > lies a solution. :-) I noticed your comment in a posting following (in sequence #) the note I replied to. Having had a cursory look at it, it looks interesting. It reminds me of Tru64-UNIX's audit log or MVS's SMF. I'm not running -current, though I'm preparing my X server machine (486DX/33 -- picked up a couple of small SCSI drives for free) as a testbed to test -current on older hardware. I can check it out then. Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 Sun/DEC Team, UNIX Group Internet: Cy.Schubert@uumail.gov.bc.ca ITSD Province of BC "e**(i*pi)+1=0" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001182143.NAA09877>