From owner-freebsd-security Thu Dec 24 12:44:21 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA17630 for freebsd-security-outgoing; Thu, 24 Dec 1998 12:44:21 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from wind.freenet.am ([194.151.101.35]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA17310 for ; Thu, 24 Dec 1998 12:43:56 -0800 (PST) (envelope-from casper@acc.am) Received: from lemming.acc.am (acc.freenet.am [194.151.101.251]) by wind.freenet.am (8.9.1/8.9.1) with ESMTP id AAA13743 for ; Fri, 25 Dec 1998 00:42:17 +0400 (GMT) Received: from acc.am (nightmar.acc.am [192.168.100.108]) by lemming.acc.am (8.9.1a/8.9.1) with ESMTP id AAA16889 for ; Fri, 25 Dec 1998 00:47:11 +0400 (AMT) Message-ID: <3682A65B.8CFB144F@acc.am> Date: Fri, 25 Dec 1998 00:38:52 +0400 From: Casper Organization: Armenian Computer Center X-Mailer: Mozilla 4.5 [en] (Win95; I) X-Accept-Language: ru,en MIME-Version: 1.0 To: "freebsd-security@FreeBSD.ORG" Subject: Magic Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Did anyone tried to cjange loader's MAGIK in the exec's header and recompile system ... I think it'll disallow to upload some executable and run it on target system ...... So if you have recompiled system , chrooting all your network services - from telnetd till httpd, ftpd & etc. , dont place compiler, mknod in chrooted dirs and disallow reading of executable files ..only --x , how intruder can break this protection ? Of course i assume that system configured properly ...... To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message