Date: Mon, 10 Jul 2000 00:23:41 -0700 From: Alfred Perlstein <bright@wintelcom.net> To: Dag-Erling Smorgrav <des@flood.ping.uio.no> Cc: Marius Bendiksen <mbendiks@eunet.no>, Adam <bsdx@looksharp.net>, chat@FreeBSD.ORG Subject: Re: making the snoop device loadable. Message-ID: <20000710002341.E25571@fw.wintelcom.net> In-Reply-To: <xzpg0pi31j8.fsf@flood.ping.uio.no>; from des@flood.ping.uio.no on Mon, Jul 10, 2000 at 09:08:43AM %2B0200 References: <Pine.BSF.4.21.0007091524430.407-100000@turtle.looksharp.net> <Pine.BSF.4.05.10007100149380.88568-100000@login-1.eunet.no> <20000709165702.V25571@fw.wintelcom.net> <xzpg0pi31j8.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
* Dag-Erling Smorgrav <des@flood.ping.uio.no> [000710 00:08] wrote: > [moving from -arch to -chat] > > Alfred Perlstein <bright@wintelcom.net> writes: > > * Marius Bendiksen <mbendiks@eunet.no> [000709 16:54] wrote: > > > Thing is; disabling kernel modules will avail you little, as an > > > illegitimate user can still use the memory devices to access physical > > > memory, and thus binary patch a live kernel. This is hard, but it can, and > > > has been done. Eivind mentioned one particular case with a person who > > > binary-patched the kernel of an old Unix to bypass the 14 character file > > > name length limitation without severing the uptime. > > I owe that person a beer. > > He's a committer (tegge@freebsd.org). The OS in question, IIRC, was > DolphinOS on an ND UniLine 8820 (colloquially known as Flipper). Ah that makes sense, Tor Egge is truly fearsome. :) -Alfred To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-chat" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000710002341.E25571>