Date: Mon, 29 Jun 1998 08:27:49 -0400 (EDT) From: andrewr <andrewr@slack.net> To: Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE> Cc: freebsd-security@FreeBSD.ORG Subject: Re: xlock Message-ID: <Pine.NEB.3.96.980629081835.12717A-100000@brooklyn.slack.net> In-Reply-To: <199806290632.IAA00836@gilberto.physik.RWTH-Aachen.DE>
next in thread | previous in thread | raw e-mail | index | archive | help
The main problem with using xlock is that the people who have made it and
mod'd it over the years, have tried to make it more of a program than it
should be. ie, giving the user more options than are needed for this type
of program. All xlock needs to be is a simple mechanism for locking X,
nothing else.
Also, I am porting a console locking program (doesn't allow VT switching),
from linux, but I have been having trouble with the actual stopping of the
allowing of VT switching. I have tried setting vtmode to be handled by
the process, then using an ioctl to execute this. This failed. Then, I
tried using flock(), that failed. If you have any ideas and would like to
know what I did before (dealing with flock() and ioctl(), just ask).
A.
*****************************************
AWR XNS, Inc.
<andrewr@slack.net>
"Drink beer, it will save your life."
On Mon, 29 Jun 1998, Christoph Kukulies wrote:
>
> Alarmed by recent buffer overflow attacks on Linux machines in
> my vicinity (an exploit for this is available) I thought about
> xlock under FreeBSD and would like to know whether the
> security hole has been sorted out under FreeBSD 2.2.x or what
> measures are advised to prevent it.
>
> --
> Chris Christoph P. U. Kukulies kuku@gil.physik.rwth-aachen.de
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96.980629081835.12717A-100000>
