Date: Thu, 16 Sep 1999 07:09:00 -0700 From: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca> To: Brett Glass <brett@lariat.org> Cc: Darren Reed <avalon@coombs.anu.edu.au>, Harry_M_Leitzell@cmu.edu, security@FreeBSD.ORG Subject: Re: BPF on in 3.3-RC GENERIC kernel Message-ID: <199909161409.HAA06535@cwsys.cwsent.com> In-Reply-To: Your message of "Wed, 15 Sep 1999 20:12:54 MDT." <4.2.0.58.19990915200910.048dba50@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <4.2.0.58.19990915200910.048dba50@localhost>, Brett Glass writes: > At 09:21 AM 9/16/99 +1000, Darren Reed wrote: > > >If the machine is rooted, you're fucked anyway, unless it's so wired > >down with things using file flags that you can't even use vi any more. > > Well, setting securelevel and making certain key files, like the kernel, > immutable helps immensely. > > Say, there's a thought. Would it be possible to make a high security > level "lock down" BPF? Or would it be possible to disable it via > a kernel config option? One could run the kernel configuration > utility to enable or disable it at boot. How about a compromise? Leave BPF in the generic kernel but add a boot option to disable it, then a site can create a loader.conf to to disable it. To enable it an intruder would have to modify loader.conf and reboot. This would surely be noticed -- noticed as much as an intruder building a new kernel with BPF and rebooting. This approach will have the advantage of leaving BPF disabled even after an upgrade. To satisfy any new install requirements, create a sysinstall option or question to disable it during install. We could even create a make.conf option to add this option to loader.conf during make installworld. Personally, I don't see why people are so impassioned about this. I and my team build a custom kernels for each FreeBSD, Tru64 UNIX, and Linux system we maintain and usually maintain custom /etc/system files for our Solaris boxes. We put in the kernel only what the kernel will use on a system, making the kernel as small as possible. Normally we disable BPF, however in cases where customers (usually developers) have many complaints about inaccessibility of a host or service, we turn on BPF, as it helps diagnose problems much more quickly. If you build custom kernels, as I think one should, this whole issue is irrelevant. Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 Open Systems Group Internet: Cy.Schubert@uumail.gov.bc.ca ITSD Cy.Schubert@gems8.gov.bc.ca Province of BC "e**(i*pi)+1=0" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199909161409.HAA06535>