Bugtraq mailing list archives
Re[4]: snooper watchers
From: rnayfield () mail iconnet com (Nayfield, Rod)
Date: Wed, 01 Mar 95 09:21:57 EST
Right, but everyone removes openprom support so people don't evilly
put in a security password on you, right? :)
rod
______________________________ Reply Separator _________________________________
Subject: Re: Re[2]: snooper watchers
Author: Karl Strickland <karl () bagpuss demon co uk> at Internet
Date: 3/1/95 9:11 AM
The best thing to do is take the nit support out of the kernel and
remove /dev/nit. Now someone would have to build a new kernel and
reboot the machine to replace the nit support.
If you are overly concerned about this, you can set the boot device
(in the rom monitor on a sparc) to boot off of some other disk, one
that is not bootable or not there. Then a reboot/fastboot/shutdown
-r/etc will not be able to automatically bring the system up. I don't
believe that you can specify boot devices from a unix reboot type
command.
is it not possible for a hacker to set his own boot device before performing his
reboot, and then reset it back to whatever-it-was later? ie by messing with
/dev/openprom or whatever its called
Current thread:
- Re: Re[2]: snooper watchers fast forward futurama (Mar 01)
- Re: Re[2]: snooper watchers System Administrator (Mar 02)
- Large security hole in SGI IRIX 5.2 Larry Glaze (Mar 02)
- Re: Large security hole in SGI IRIX 5.2 Christian A. Ratliff (Mar 03)
- Re: Large security hole in SGI IRIX 5.2 Larry Glaze (Mar 03)
- Re: Large security hole in SGI IRIX 5.2 Dave Schweisguth (Mar 03)
- Re: Large security hole in SGI IRIX 5.2 Dave Schweisguth (Mar 03)
- Re: Large security hole in SGI IRIX 5.2 Software Test Account (Mar 07)
- Re: Large security hole in SGI IRIX 5.2 Steve Robbins (Mar 10)
- Re: Large security hole in SGI IRIX 5.2 Christian A. Ratliff (Mar 03)
- <Possible follow-ups>
- Re: Re[2]: snooper watchers F. L. Charles Seeger III (Mar 01)
- Re: snooper watchers der Mouse (Mar 01)
