From owner-freebsd-security Sat Sep 18 0:29:14 1999 Delivered-To: freebsd-security@freebsd.org Received: from zippy.cdrom.com (zippy.cdrom.com [204.216.27.228]) by hub.freebsd.org (Postfix) with ESMTP id 4333F14DE5 for ; Sat, 18 Sep 1999 00:29:13 -0700 (PDT) (envelope-from jkh@zippy.cdrom.com) Received: from localhost (jkh@localhost [127.0.0.1]) by zippy.cdrom.com (8.9.3/8.9.3) with ESMTP id AAA02286; Sat, 18 Sep 1999 00:28:54 -0700 (PDT) (envelope-from jkh@zippy.cdrom.com) To: Wes Peters Cc: Warner Losh , "Rodney W. Grimes" , "Jordan K. Hubbard" , Brett Glass , security@FreeBSD.ORG Subject: Re: BPF on in 3.3-RC GENERIC kernel In-reply-to: Your message of "Sat, 18 Sep 1999 01:06:30 MDT." <37E339F6.F5C889D6@softweyr.com> Date: Sat, 18 Sep 1999 00:28:54 -0700 Message-ID: <2282.937639734@localhost> From: "Jordan K. Hubbard" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > A well-defined and well-architected syscall auditing mechanism would be a > great security addition, and right up the alley of what I'm looking for. Well, that much I thought Robert Watson had already done... See his postings in -current on the topic or go to http://www.watson.org/fbsd-hardening/posix1e/ - Jordan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message