Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Sep 1999 18:54:24 -0600
From:      Brett Glass <brett@lariat.org>
To:        Liam Slusser <liam@tiora.net>, Kenny Drobnack <kdrobnac@mission.mvnc.edu>
Cc:        "Harry M. Leitzell" <Harry_M_Leitzell@cmu.edu>, security@FreeBSD.ORG
Subject:   Re: BPF on in 3.3-RC GENERIC kernel
Message-ID:  <4.2.0.58.19990916185341.00aaf100@localhost>
In-Reply-To: <Pine.GSO.4.05.9909161559330.6933-100000@kinetic.tiora.net>
References:  <Pine.GSO.3.96.990916150427.5757E-100000@mission.mvnc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
At 04:14 PM 9/16/99 -0700, Liam Slusser wrote:

>Right...but if the system was hacked what would stop the hacker from
>building BPF in a kernel?

securelevel=2 or securelevel=3.

Or Tripwire.

--Brett




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.19990916185341.00aaf100>