From owner-freebsd-arch Sun Jul 9 11:17:50 2000 Delivered-To: freebsd-arch@freebsd.org Received: from critter.freebsd.dk (critter.freebsd.dk [212.242.40.131]) by hub.freebsd.org (Postfix) with ESMTP id A4C4537B94B for ; Sun, 9 Jul 2000 11:17:47 -0700 (PDT) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.9.3/8.9.3) with ESMTP id UAA17528; Sun, 9 Jul 2000 20:17:20 +0200 (CEST) (envelope-from phk@critter.freebsd.dk) To: Adam Cc: "Daniel C. Sobral" , Alfred Perlstein , arch@FreeBSD.ORG Subject: Re: making the snoop device loadable. In-reply-to: Your message of "Sun, 09 Jul 2000 14:12:42 EDT." Date: Sun, 09 Jul 2000 20:17:20 +0200 Message-ID: <17526.963166640@critter.freebsd.dk> From: Poul-Henning Kamp Sender: owner-freebsd-arch@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In message , Adam writes: >On Sun, 9 Jul 2000, Poul-Henning Kamp wrote: > >> >>>If this change goes in, what do you do if you wish not to have snooping >>>capable through the snp device and do not wish to lock unneccessary parts >>>of the system down with securelevel? >> >>You do the same as before: Hold on tight to your root password. > >I dont like kernel changes that make the kernel do less babysitting and me >more. Tough, I guess. You have always needed to babysit your root password. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD coreteam member | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-arch" in the body of the message