From owner-freebsd-security Thu Sep 16 22:31: 0 1999 Delivered-To: freebsd-security@freebsd.org Received: from sentry.granch.ru (sentry.granch.ru [212.20.5.135]) by hub.freebsd.org (Postfix) with ESMTP id 637A914F00 for ; Thu, 16 Sep 1999 22:30:40 -0700 (PDT) (envelope-from shelton@sentry.granch.ru) Received: from localhost (IDENT:shelton@localhost.granch.ru [127.0.0.1]) by sentry.granch.ru (8.9.3/8.9.3) with ESMTP id MAA39916; Fri, 17 Sep 1999 12:30:14 +0700 (NOVST) Date: Fri, 17 Sep 1999 12:30:14 +0700 (NOVST) From: "Rashid N. Achilov" To: Brett Glass Cc: security@FreeBSD.ORG Subject: Re: BPF on in 3.3-RC GENERIC kernel In-Reply-To: <4.2.0.58.19990916185341.00aaf100@localhost> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, 16 Sep 1999, Brett Glass wrote: > At 04:14 PM 9/16/99 -0700, Liam Slusser wrote: > > >Right...but if the system was hacked what would stop the hacker from > >building BPF in a kernel? > > securelevel=2 or securelevel=3. > > Or Tripwire. What's different between securelevel=1, securelevel=2 and securelevel=3? With Best Regards. Rashid N. Achilov (RNA1-RIPE), Cert. ID: 28514, Granch Ltd. lead engineer e-mail: achilov@granch.ru, tel (383-2) 24-2363 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message