Bugtraq mailing list archives

Re[4]: snooper watchers


From: rnayfield () mail iconnet com (Nayfield, Rod)
Date: Wed, 01 Mar 95 09:21:57 EST


     Right, but everyone removes openprom support so people don't evilly 
     put in a security password on you, right?  :)
     
     rod
     


______________________________ Reply Separator _________________________________
Subject: Re: Re[2]: snooper watchers
Author:  Karl Strickland <karl () bagpuss demon co uk> at Internet
Date:    3/1/95 9:11 AM

     

     The best thing to do is take the nit support out of the kernel and 
     remove /dev/nit.  Now someone would have to build a new kernel and 
     reboot the machine to replace the nit support.
     
     If you are overly concerned about this, you can set the boot device 
     (in the rom monitor on a sparc) to boot off of some other disk, one 
     that is not bootable or not there.  Then a reboot/fastboot/shutdown 
     -r/etc will not be able to automatically bring the system up.  I don't 
     believe that you can specify boot devices from a unix reboot type 
     command.
     
is it not possible for a hacker to set his own boot device before performing his
reboot, and then reset it back to whatever-it-was later?  ie by messing with 
/dev/openprom or whatever its called
     



Current thread: