Date: Thu, 12 Dec 1996 18:35:43 -0700 (MST) From: Softweyr LLC <softweyr@xmission.com> To: jhupp@gensys.com (Jeff Hupp) Cc: lithium@cia-g.com, security@freebsd.org Subject: Re: Risk of having bpf0? Message-ID: <199612130135.SAA21478@xmission.xmission.com> In-Reply-To: <199612121501.JAA23109@black.gensys.com> from "Jeff Hupp" at Dec 12, 96 09:01:46 am
next in thread | previous in thread | raw e-mail | index | archive | help
Stephen Fisher bound electrons in the following form:: : Can't the hacker just recompile the kernel with bpf support and then use : it, though? Jef Hupp wittily replied: > I notice when one of my systems reboots. > > Leaving bpf in a public machine connected to the internet is a bit > like leaving a loaded gun in a public place ~ you are largely responsible > for what happens. Also, a good security monitoring program will notice *new* devices in the kernel (since the last run, or update of the database) and warn you about them. No, I don't know of one for FreeBSD that does this, but it would make a great M.S. non-thesis project. ;^) -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC http://www.xmission.com/~softweyr softweyr@xmission.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199612130135.SAA21478>