From owner-freebsd-questions@FreeBSD.ORG Thu Jun 12 08:14:15 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 69DEB1065679 for ; Thu, 12 Jun 2008 08:14:15 +0000 (UTC) (envelope-from perryh@pluto.rain.com) Received: from agora.rdrop.com (agora.rdrop.com [199.26.172.34]) by mx1.freebsd.org (Postfix) with ESMTP id 20F118FC21 for ; Thu, 12 Jun 2008 08:14:15 +0000 (UTC) (envelope-from perryh@pluto.rain.com) Received: from agora.rdrop.com (66@localhost [127.0.0.1]) by agora.rdrop.com (8.13.1/8.12.7) with ESMTP id m5C8E40x077678 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 12 Jun 2008 01:14:05 -0700 (PDT) (envelope-from perryh@pluto.rain.com) Received: (from uucp@localhost) by agora.rdrop.com (8.13.1/8.12.9/Submit) with UUCP id m5C8E442077677; Thu, 12 Jun 2008 01:14:04 -0700 (PDT) Received: from fbsd61 by pluto.rain.com (4.1/SMI-4.1-pluto-M2060407) id AA18099; Thu, 12 Jun 08 01:03:37 PDT Date: Thu, 12 Jun 2008 01:03:00 -0700 From: perryh@pluto.rain.com To: dfeustel@mindspring.com, jeffrey@goldmark.org Message-Id: <4850d834.VvRLmDrvgD3J8RVH%perryh@pluto.rain.com> References: <20080612020555.56DD08FC14@mx1.freebsd.org> In-Reply-To: <20080612020555.56DD08FC14@mx1.freebsd.org> User-Agent: nail 11.25 7/29/05 Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: cpghost@cordula.ws, freebsd-questions@freebsd.org Subject: Re: FreeBSD and User Security X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 12 Jun 2008 08:14:15 -0000 > How do you know that the bios has not been reflashed by a virus, > trojan, or rootkit? For that matter, how do you know that the *original* bios was free of "interesting non-essentials"? It's been a few years since bios were delivered in socketed ROMs/EPROMs (readable by a standalone device, independently of their own operation) or since sources were typically published :)