Date: Sat, 13 Apr 2002 12:41:10 -0700 (PDT) From: Mikko Tyolajarvi <mikko@dynas.se> To: simokawa@sat.t.u-tokyo.ac.jp Cc: hackers@freebsd.org Subject: Re: FireWire for kernel hackers Message-ID: <200204131941.g3DJfAb18611@mikko.rsa.com> References: <ybselhkx4r3.wl@ett.sat.t.u-tokyo.ac.jp>
next in thread | previous in thread | raw e-mail | index | archive | help
In local.freebsd.hackers you write: >Quoted from 00README in >http://people.freebsd.org/~simokawa/firewire-20020412.tar.gz > As you know, IEEE1394 is a bus and OHCI supports physical access > to the host memory. This means that you can access the remote > host over firewire without software support at the remote host. > In other words, you can investigate remote host's physical memory > whether its OS is alive or crashed or hangs up. Umm... excuse a stupid question, but does this mean that a firewire port always gives unconditional access to the host's memory? Great for kernel debugging. Maybe not so great for a running system, from a security point a view (ok, physical access eventually equals full access, but plugging in a firewire cable is a heck of a lot faster than using a screwdriver...) ? /Mikko -- Mikko Työläjärvi_______________________________________mikko@rsasecurity.com RSA Security To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204131941.g3DJfAb18611>