Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 20 Jun 1999 11:34:28 +1000 (EST)
From:      Nicholas Brawn <ncb@zip.com.au>
To:        Frank Tobin <ftobin@bigfoot.com>
Cc:        Chris Shenton <cshenton@uucom.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: securelevel descr
Message-ID:  <Pine.LNX.4.05.9906201133270.3762-100000@zipper.zip.com.au>
In-Reply-To: <Pine.BSF.4.10.9906181029560.56847-100000@srh0710.urh.uiuc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 18 Jun 1999, Frank Tobin wrote:

> Chris Shenton, at 11:18 on 18 Jun 1999, wrote:
> 
> > But if inetd can start daemons on priv ports, then a cracker can just
> > modify inetd.conf to start (say) "nc" on the telnet port. Or am I
> > missing something? 
> 
> chflags simmutable inetd.conf;  Need I say more? :)
> 
> chflags is a real wonder drug, IMO.

The intruder could still setup a cron job to periodically start up
the backdoor.

Nick



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.05.9906201133270.3762-100000>