Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 30 Jul 1999 16:04:47 -0400 (EDT)
From:      "Brian F. Feldman" <green@FreeBSD.org>
To:        "Jordan K. Hubbard" <jkh@zippy.cdrom.com>
Cc:        hackers@FreeBSD.org
Subject:   Re: So, back on the topic of enabling bpf in GENERIC...
Message-ID:  <Pine.BSF.4.10.9907301603050.6951-100000@janus.syracuse.net>
In-Reply-To: <8442.933363979@zippy.cdrom.com>

next in thread | previous in thread | raw e-mail | index | archive | help
If root is compromised, that's the only way bpf can be gotten to by
default. When root's compromised, if no bpf is available, the mem devices
can still be created (if not there) and network queues can be listened to.
And can't IFF_PROMISC be turned on too?

There's no good reason to not have bpf in at least the boot disk kernel.

 Brian Fundakowski Feldman      _ __ ___ ____  ___ ___ ___  
 green@FreeBSD.org                   _ __ ___ | _ ) __|   \ 
     FreeBSD: The Power to Serve!        _ __ | _ \._ \ |) |
       http://www.FreeBSD.org/              _ |___/___/___/ 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9907301603050.6951-100000>