Date: Fri, 30 Jul 1999 16:04:47 -0400 (EDT) From: "Brian F. Feldman" <green@FreeBSD.org> To: "Jordan K. Hubbard" <jkh@zippy.cdrom.com> Cc: hackers@FreeBSD.org Subject: Re: So, back on the topic of enabling bpf in GENERIC... Message-ID: <Pine.BSF.4.10.9907301603050.6951-100000@janus.syracuse.net> In-Reply-To: <8442.933363979@zippy.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
If root is compromised, that's the only way bpf can be gotten to by default. When root's compromised, if no bpf is available, the mem devices can still be created (if not there) and network queues can be listened to. And can't IFF_PROMISC be turned on too? There's no good reason to not have bpf in at least the boot disk kernel. Brian Fundakowski Feldman _ __ ___ ____ ___ ___ ___ green@FreeBSD.org _ __ ___ | _ ) __| \ FreeBSD: The Power to Serve! _ __ | _ \._ \ |) | http://www.FreeBSD.org/ _ |___/___/___/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9907301603050.6951-100000>