From owner-freebsd-hackers Wed Jul 15 17:14:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA11523 for freebsd-hackers-outgoing; Wed, 15 Jul 1998 17:14:07 -0700 (PDT) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from indigo.ie (nsmart@ts03-117.dublin.indigo.ie [194.125.148.127]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA11455 for ; Wed, 15 Jul 1998 17:14:02 -0700 (PDT) (envelope-from rotel@indigo.ie) Received: (from nsmart@localhost) by indigo.ie (8.8.8/8.8.7) id BAA02112; Thu, 16 Jul 1998 01:08:33 +0100 (IST) (envelope-from rotel@indigo.ie) From: Niall Smart Message-Id: <199807160008.BAA02112@indigo.ie> Date: Thu, 16 Jul 1998 01:08:33 +0000 In-Reply-To: <199807152155.RAA07159@lor.watermarkgroup.com>; Luoqi Chen Reply-To: rotel@indigo.ie X-Files: The truth is out there X-Mailer: Mail User's Shell (7.2.6 beta(3) 11/17/96) To: Luoqi Chen , joelh@gnu.org, matthew@wolfepub.com Subject: Re: Protecting data in memory Cc: hackers@FreeBSD.ORG Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Jul 15, 5:55pm, Luoqi Chen wrote: } Subject: Re: Protecting data in memory > > Actually, if you raise the securelevel to 1 or above, not even root can > access kernel memory space (see init(8)). It is still possible to access > user process memory space through procfs -- procfs doesn't yet check And ptrace(2). Niall -- Niall Smart. PGP: finger njs3@motmot.doc.ic.ac.uk FreeBSD: Turning PC's into Workstations: www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message