Date: Thu, 17 Jun 1999 10:55:33 -0400 (EDT) From: Barrett Richardson <barrett@phoenix.aye.net> To: Richard Childers <rchilders@hamquist.com> Cc: Warner Losh <imp@harmony.village.org>, Pete Fritchman <petef@netreach.net>, Unknow User <kernel@tdnet.com.br>, security@FreeBSD.ORG Subject: Re: some nice advice.... Message-ID: <Pine.BSF.4.01.9906171053270.21723-100000@phoenix.aye.net> In-Reply-To: <3768EE6F.EEE2706F@hamquist.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Try "rm /kernel", "ls > /kernel", "ls >> /kernel" if it is schg those are no-ops. - Barrett Richardson barrett@phoenix.aye.net On Thu, 17 Jun 1999, Richard Childers wrote: > > "My kernel is set schg ..." > > Could you please expand on this ? > > > -- richard > > > > Warner Losh wrote: > > > > In message <Pine.LNX.3.96.990616182221.28882A-100000@static-petef.netreach.net> Pete Fritchman writes: > > : If you get compromised, why does it matter? > > : The attacker compiles a new kernel, waits for you to reboot, boom. > > > > Nope. My kernel is set schg and i run at a high secure level so you > > can't replace my kernel. > > > > : It's kind of hard/stupid to think about something in terms of "what if you > > : get compromised" - he'll have root and be able to do whatever you are > > : thinking about doing (equal privelages) > > > > No it isn't. You can minimize the damage with some careful planning. > > > > Warner > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > with "unsubscribe freebsd-security" in the body of the message > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9906171053270.21723-100000>