Date: Sun, 10 Aug 2003 21:01:03 -1000 From: Jason Dambrosio <jason@wiz.cx> To: Bruce M Simpson <bms@spc.org> Cc: FreeBSD Security Advisories <security@freebsd.org> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-03:09.signal Message-ID: <20030811070103.GB85000@tekgenesis.net> In-Reply-To: <20030811064438.GG31845@spc.org> References: <200308110257.h7B2v6YJ061278@freefall.freebsd.org> <20030811063316.GA85000@tekgenesis.net> <20030811064438.GG31845@spc.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Aug 11, 2003 at 07:44:38AM +0100, Bruce M Simpson wrote:
> On Sun, Aug 10, 2003 at 08:33:16PM -1000, Jason Dambrosio wrote:
> > Wouldn't a possible workaround be, to load a kld module that would
> > replace the ptrace(2) system call with a patched one? I remember doing
> > such a trick for modifying other system calls using kld modules...
>
> That isn't really a solution; more of a band-aid.
That's exactly why I called it a workaround and not a solution.
The primary idea of a workaround being to avoid having downtime for
a reboot to patch the kernel until your next scheduled maintence window.
> Besides, if someone compromises the system in some other way, they can
> just remove your module or unload it. Unless you're a big securelevels fan.
If someone compromises the system via some other method, why would
they care about unloading a module if they already have root?
My point was simply that the advisory said there was no workaround,
but I believe you could use this method as a workaround.
Jason
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030811070103.GB85000>
