Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Dec 2000 14:04:35 -0800
From:      kj@indifference.org
To:        freebsd-security@freebsd.org
Subject:   Re: Read-Only Filesystems
Message-ID:  <20001221140435.F25684@indifference.org>
In-Reply-To: <20001221060108.B26775@citusc.usc.edu>; from kris@FreeBSD.ORG on Thu, Dec 21, 2000 at 06:01:08AM -0800
References:  <20001219114936.A23819@rfx-64-6-211-149.users.reflexco> <20001219120953.S19572@fw.wintelcom.net> <20001219211642.D13474@citusc.usc.edu> <3A40BED3.1070909@2cactus.com> <20001220174056.C22288@citusc.usc.edu> <20001220174129.F19572@fw.wintelcom.net> <20001220175931.E22288@citusc.usc.edu> <20001220231205.W96105@149.211.6.64.reflexcom.com> <20001221060108.B26775@citusc.usc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
> Nope, that's the one. Once the attacker breaks root on a high
> securelevel machine they can arrange it so that the next time the
> system boots it does their dirty work for them prior to raising the
> securelevel (e.g. load a KLD which allows them backdoor access around
> the securelevel restrictions, so the system appears to be running
> normally).
> 
> Kris


To be truly, anal. Couldn't one just put a bios boot password on every 
server reboot (really how often do we need to reboot). And have a serial
console hooked up to the server.

That way if the attacker drops the security level and reboots, he can't
modify anything as the server never boots up. It's major downtime, but
better then a comprimise.

K.J.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001221140435.F25684>