Date: Fri, 24 Mar 2000 20:41:18 -0700 From: Warner Losh <imp@village.org> To: Harold Gutch <logix@foobar.franken.de> Cc: "Daniel C. Sobral" <dcs@newsguy.com>, Olaf Hoyer <ohoyer@fbwi.fh-wilhelmshaven.de>, security@FreeBSD.ORG Subject: Re: New article Message-ID: <200003250341.UAA59342@harmony.village.org> In-Reply-To: Your message of "Fri, 24 Mar 2000 16:41:46 %2B0100." <20000324164146.A18107@foobar.franken.de> References: <20000324164146.A18107@foobar.franken.de> <200003231326.IAA24776@blackhelicopters.org> <38DA7A60.B7C23121@newsguy.com> <38DA950C.D4DCE9CC@softweyr.com> <4.1.20000324022914.00cbed30@mail.rz.fh-wilhelmshaven.de> <38DB2B63.82552C96@newsguy.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <20000324164146.A18107@foobar.franken.de> Harold Gutch writes: : I'd say that depends on how paranoid you were when chflag-ing : various files and directories, like /kernel, /boot, /etc/rc.*, : /lkm etc.. Of course that won't buy you anything unless you're : running in secure level 1 or higher. security(7) is a nice : introduction to this. Of course it won't buy you anything. Full stop. Much of the boot process executes at secure level 0, which means if you can compromize even one file in the boot chain, you'll be able to do anything you want. : I have to agree though that I wouldn't trust a (root-)compromised : machine anymore and would re-install it. Nevertheless I still : somehow doubt that an attacker could inject arbitrary code into : the kernel on an otherwise correctly configured box, which then : also implies "chflags -R /usr/src/sys schg" for example (and I'm : sure I've forgotten a couple of other things here as well). Don't put source on secure machines. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200003250341.UAA59342>
