Date: Wed, 4 Oct 2000 03:08:59 -0700 (PDT) From: Dima Dorfman <dima@unixfreak.org> To: Kris Kennaway <kris@FreeBSD.org> Cc: Dima Dorfman <dima@unixfreak.org>, Alfred Perlstein <bright@wintelcom.net>, Mike Silbersack <silby@silby.com>, security@FreeBSD.ORG Subject: Re: BSD chpass (fwd) Message-ID: <20001004100859.33A4A1F0A@static.unixfreak.org> In-Reply-To: <20001004023249.B76230@freefall.freebsd.org> from Kris Kennaway at "Oct 4, 2000 02:32:49 am"
next in thread | previous in thread | raw e-mail | index | archive | help
> On Wed, Oct 04, 2000 at 02:27:58AM -0700, Dima Dorfman wrote:
>
> > Actually, I think you can do it without null mounts. mv /usr/bin
> > /usr/bin2, chmod 000 /usr/bin2, then remake /usr/bin (without chpass,
> > of course).
>
> I think you're right. Which is a good reason why your /usr/bin should
> be schg too ;-)
Then it'd become: mv /usr /usr2, cp everything from /usr2 to /usr
except for bin, etc. You get the idea. It does deter them a little
bit, though. I usually set /bin, /sbin, /modules (or /boot/kernel in
-current), and /boot schg and not worry too much about /usr/[s]bin.
IMO, the bottom line is, schg can only prevent an attacker if they
don't have a good understanding of the system (which accounts for most
of the script kid population). A really clever attacker would modify
your securelevel settings in rc.conf, reboot the machine making it
look like a panic or power surge (if they know you exclusivly access
it remotly), fool around, then change it back. Tripwire on a r/o disk
would tell you about it, but you can't do that remotly unless you plan
on never touching any system binaries. Or am I missing something?
--
Dima Dorfman <dima@unixfreak.org>
Finger dima@unixfreak.org for my public PGP key.
"I had a terrible education. I attended a school for emotionally disturbed
teachers."
-- Woody Allen
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001004100859.33A4A1F0A>
