Date: Sun, 20 Jun 1999 11:34:28 +1000 (EST) From: Nicholas Brawn <ncb@zip.com.au> To: Frank Tobin <ftobin@bigfoot.com> Cc: Chris Shenton <cshenton@uucom.com>, freebsd-security@FreeBSD.ORG Subject: Re: securelevel descr Message-ID: <Pine.LNX.4.05.9906201133270.3762-100000@zipper.zip.com.au> In-Reply-To: <Pine.BSF.4.10.9906181029560.56847-100000@srh0710.urh.uiuc.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 18 Jun 1999, Frank Tobin wrote: > Chris Shenton, at 11:18 on 18 Jun 1999, wrote: > > > But if inetd can start daemons on priv ports, then a cracker can just > > modify inetd.conf to start (say) "nc" on the telnet port. Or am I > > missing something? > > chflags simmutable inetd.conf; Need I say more? :) > > chflags is a real wonder drug, IMO. The intruder could still setup a cron job to periodically start up the backdoor. Nick To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.05.9906201133270.3762-100000>