Date: Fri, 30 Jul 1999 16:39:01 -0400 (EDT) From: "Brian F. Feldman" <green@FreeBSD.org> To: Matthew Dillon <dillon@apollo.backplane.com> Cc: "Jordan K. Hubbard" <jkh@zippy.cdrom.com>, hackers@FreeBSD.org Subject: Re: So, back on the topic of enabling bpf in GENERIC... Message-ID: <Pine.BSF.4.10.9907301638300.6951-100000@janus.syracuse.net> In-Reply-To: <199907302037.NAA94153@apollo.backplane.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 30 Jul 1999, Matthew Dillon wrote:
> : But even if you turn off the bpf device, you still have /dev/mem and
> : /dev/kmem to worry about. For that matter, the intruder can still write
> : raw devices. Also, there is another kernel feature called kldload(8).
>
> BTW, I wrote this section because a hacker actually installed the bpf
> device via the module loader during one of the root compromises at BEST,
> a year or two ago. He had gotten it from a hackers cookbook of exploits
> which he convieniently left on-disk long enough for our daily backups to
> catch it :-).
Want to post the ocde for it? It would be interesting to see how that was
done!
>
> -Matt
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-hackers" in the body of the message
>
Brian Fundakowski Feldman _ __ ___ ____ ___ ___ ___
green@FreeBSD.org _ __ ___ | _ ) __| \
FreeBSD: The Power to Serve! _ __ | _ \._ \ |) |
http://www.FreeBSD.org/ _ |___/___/___/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9907301638300.6951-100000>
