Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Dec 1996 18:35:43 -0700 (MST)
From:      Softweyr LLC <softweyr@xmission.com>
To:        jhupp@gensys.com (Jeff Hupp)
Cc:        lithium@cia-g.com, security@freebsd.org
Subject:   Re: Risk of having bpf0?
Message-ID:  <199612130135.SAA21478@xmission.xmission.com>
In-Reply-To: <199612121501.JAA23109@black.gensys.com> from "Jeff Hupp" at Dec 12, 96 09:01:46 am

next in thread | previous in thread | raw e-mail | index | archive | help
Stephen Fisher bound electrons in the following form::
: Can't the hacker just recompile the kernel with bpf support and then use
: it, though?

Jef Hupp wittily replied:
> 	I notice when one of my systems reboots.
> 
> 	Leaving bpf in a public machine connected to the internet is a bit
> like leaving a loaded gun in a public place ~ you are largely responsible
> for what happens.

Also, a good security monitoring program will notice *new* devices in
the kernel (since the last run, or update of the database) and warn you
about them.  No, I don't know of one for FreeBSD that does this, but 
it would make a great M.S. non-thesis project.  ;^)

-- 
          "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                       Softweyr LLC
http://www.xmission.com/~softweyr                       softweyr@xmission.com



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199612130135.SAA21478>