Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Sep 1999 20:12:54 -0600
From:      Brett Glass <brett@lariat.org>
To:        Darren Reed <avalon@coombs.anu.edu.au>
Cc:        Harry_M_Leitzell@cmu.edu, security@FreeBSD.ORG
Subject:   Re: BPF on in 3.3-RC GENERIC kernel
Message-ID:  <4.2.0.58.19990915200910.048dba50@localhost>
In-Reply-To: <199909152321.JAA12988@cheops.anu.edu.au>
References:  <4.2.0.58.19990915170025.048d0b00@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
At 09:21 AM 9/16/99 +1000, Darren Reed wrote:

>If the machine is rooted, you're fucked anyway, unless it's so wired
>down with things using file flags that you can't even use vi any more.

Well, setting securelevel and making certain key files, like the kernel, 
immutable helps immensely. 

Say, there's a thought. Would it be possible to make a high security
level "lock down" BPF? Or would it be possible to disable it via
a kernel config option? One could run the kernel configuration
utility to enable or disable it at boot.

--Brett



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.19990915200910.048dba50>