From owner-freebsd-security Mon Apr 8 1:27:52 2002 Delivered-To: freebsd-security@freebsd.org Received: from probsd.ws (ilm26-7-034.ec.rr.com [66.26.7.34]) by hub.freebsd.org (Postfix) with ESMTP id 8CDBE37B419 for ; Mon, 8 Apr 2002 01:27:49 -0700 (PDT) Received: from probsd.ws (www@localhost [127.0.0.1]) by probsd.ws (8.12.2/8.12.2) with SMTP id g388UL6j000184 for ; Mon, 8 Apr 2002 04:30:21 -0400 (EDT) (envelope-from ms@probsd.ws) Received: from 192.168.1.2 (SquirrelMail authenticated user ms) by probsd.ws with HTTP; Mon, 8 Apr 2002 04:30:21 -0400 (EDT) Message-ID: <1074.192.168.1.2.1018254621.squirrel@probsd.ws> Date: Mon, 8 Apr 2002 04:30:21 -0400 (EDT) Subject: Berkley Packet Filter From: "Michael Sharp" To: X-Priority: 3 Importance: Normal X-MSMail-Priority: Normal X-Mailer: SquirrelMail (version 1.2.5) MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org It is my understanding that if you comment OUT the bpf line in the kernel and re-compile, this disables things like nmap and prevents a sniffer from running on the network * easily * correct? The reason I put * easily * in there is because I am aware of other ways to bypass bpf, but I believe disabling would defeat 99% of the script kiddies. Michael To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message