At 21:05 Uhr -0300 3.10.2001, Peter Cordes wrote:
>  Yep, you can load modules, and you can run mknod(2) to make your own
>/dev/hda, among other things.  These are blockable by removing capabilities,
>though.  (At least, the modules attack is.)

I think another one is creating a [k]mem device (haven't tried it). 
Afaik, LIDS people had to introduce/implement a new capability to 
block direct memory access, which implies that on a normal kernel you 
can't prevent root from escaping chroot.

>  Obscurity is not useless.  It is no good as your only defence, but combined
>with solid security, obscurity makes an attackers job harder and more time
>consuming.  If nothing else, it may well give you more time to see stuff
>going on in the logs before the attacker breaks into anything where they can
>do damage.

I guess it really depends on whether obscurity is used in a standard 
install (-> exploits are spread), or only in one particular install 
(that doesn't allow the use of some standard procedure).

Christian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to