Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Feb 2003 21:57:15 -0500
From:      Anthony Schneider <anthony@x-anthony.com>
To:        Julian Elischer <julian@elischer.org>
Cc:        hackers@FreeBSD.ORG, des@FreeBSD.ORG
Subject:   Re: Some "security" questions.
Message-ID:  <20030211025715.GA39077@x-anthony.com>
In-Reply-To: <Pine.BSF.4.21.0302101752500.49102-100000@InterJet.elischer.org>
References:  <Pine.BSF.4.21.0302101752500.49102-100000@InterJet.elischer.org>

next in thread | previous in thread | raw e-mail | index | archive | help
> #2 sounds like a great DOS to me.. 
> operator<CR>
> <CR>
> operator<CR>
> <CR>
> operator<CR>
> <CR>

put a two (ten???) second delay after each failed login?

as for the commands, you could hack sys/kern_acct.c to include
command arguments and acct.h for struct acct and all the dependent
utilities and libraries and remember that since acct_process writes 
accounting information on process exit, there's no guarantee that 
the arguments are the same as when passed to execve.  so in the 
end, this is probably not the best way to do it.

-Anthony.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030211025715.GA39077>