Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-04 Thread Jordan K. Hubbard
> I am pro. > > It takes a root compromise to use it anyway, and its usefulness > for DHCP and rarpd is too compelling. > > Perhaps the comments in the GENERIC file could be updated. Well, given that I've gotten primarily positive support for this I guess it's time to do it. Warner, do you want

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-04 Thread Mark Murray
> This is a clear security vs functionality issue and I need to get a > good feel for which "cause" is ascendent here in knowing which way to > jump on the matter. Can we now hear the closing arguments from the > pro and con folks? I am pro. It takes a root compromise to use it anyway, and its u

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-03 Thread Jordan K. Hubbard
> I am pro. > > It takes a root compromise to use it anyway, and its usefulness > for DHCP and rarpd is too compelling. > > Perhaps the comments in the GENERIC file could be updated. Well, given that I've gotten primarily positive support for this I guess it's time to do it. Warner, do you wan

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-03 Thread Mark Murray
> This is a clear security vs functionality issue and I need to get a > good feel for which "cause" is ascendent here in knowing which way to > jump on the matter. Can we now hear the closing arguments from the > pro and con folks? I am pro. It takes a root compromise to use it anyway, and its

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-02 Thread Peter Jeremy
In message <37a3b701.851df...@softweyr.com> Wes Peters writes: >Do we have a list of all services that use bpf? In the base system, ipfilter et al (ie ipsend(1)), tcpdump, rbootd, rarpd and dhcp. Someone who's got a complete set of ports might like to comment on what ports need bpf. Of these, we

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-02 Thread Peter Jeremy
In message <[EMAIL PROTECTED]> Wes Peters writes: >Do we have a list of all services that use bpf? In the base system, ipfilter et al (ie ipsend(1)), tcpdump, rbootd, rarpd and dhcp. Someone who's got a complete set of ports might like to comment on what ports need bpf. Of these, we need to lea

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-02 Thread Josef Karthauser
On Sun, Aug 01, 1999 at 10:17:54AM -0400, Sergey Babkin wrote: > Warner Losh wrote: > > > > In message <37a3b701.851df...@softweyr.com> Wes Peters writes: > > : Do we have a list of all services that use bpf? I'm willing to edit the > > man > > : pages, given a list. I guess I could just grep-o

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-02 Thread Josef Karthauser
On Sun, Aug 01, 1999 at 10:17:54AM -0400, Sergey Babkin wrote: > Warner Losh wrote: > > > > In message <[EMAIL PROTECTED]> Wes Peters writes: > > : Do we have a list of all services that use bpf? I'm willing to edit the man > > : pages, given a list. I guess I could just grep-o-matic here, huh?

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-01 Thread Sergey Babkin
Warner Losh wrote: > > In message <37a3b701.851df...@softweyr.com> Wes Peters writes: > : Do we have a list of all services that use bpf? I'm willing to edit the man > : pages, given a list. I guess I could just grep-o-matic here, huh? > > Yes. I'm also in a holding off pattern until we know t

Re: So, back on the topic of enabling bpf in GENERIC...

1999-08-01 Thread Sergey Babkin
Warner Losh wrote: > > In message <[EMAIL PROTECTED]> Wes Peters writes: > : Do we have a list of all services that use bpf? I'm willing to edit the man > : pages, given a list. I guess I could just grep-o-matic here, huh? > > Yes. I'm also in a holding off pattern until we know the exact imp

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <37a3b701.851df...@softweyr.com> Wes Peters writes: : Do we have a list of all services that use bpf? I'm willing to edit the man : pages, given a list. I guess I could just grep-o-matic here, huh? Yes. I'm also in a holding off pattern until we know the exact impact for all daemons

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <[EMAIL PROTECTED]> Wes Peters writes: : Do we have a list of all services that use bpf? I'm willing to edit the man : pages, given a list. I guess I could just grep-o-matic here, huh? Yes. I'm also in a holding off pattern until we know the exact impact for all daemons that use th

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
Matthew Dillon wrote: > > :> consistant with the meaning of "raw devices". > : > :Disabling bpf it will break rarpd (and also rbootd but it is less > :important). I think such a thing should be mentioned in documentation. > : > :-SB > > Not if rarpd is started via the rc files... it would hoo

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
Warner Losh wrote: > > In message <9518.933378...@zippy.cdrom.com> "Jordan K. Hubbard" writes: > : > There are no security levels > 3. I'd be happy with > 0. This is > : > consistant with the meaning of "raw devices". > : > : Would you be willing to make this change? > > Yes. I will make this

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
"Brian F. Feldman" wrote: > > On Fri, 30 Jul 1999, Brian F. Feldman wrote: > > > > In that case, my argument changes to: > > "There's no good reason not to have bpf in the GENERIC kernel." > > And how about having > if (securelevel > 3) > return (EPERM); > in bpf_open()?

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
"Jordan K. Hubbard" wrote: > > We got off onto a big tangent about switches and vlans and stuff and I > learned a number of interesting things, don't get me wrong, but we > still haven't established any consensus on the trade-offs of enabling > bpf. This wasn't meant to be a hypothetical discussi

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
Matthew Dillon wrote: > > :> consistant with the meaning of "raw devices". > : > :Disabling bpf it will break rarpd (and also rbootd but it is less > :important). I think such a thing should be mentioned in documentation. > : > :-SB > > Not if rarpd is started via the rc files... it would ho

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
Warner Losh wrote: > > In message <[EMAIL PROTECTED]> "Jordan K. Hubbard" writes: > : > There are no security levels > 3. I'd be happy with > 0. This is > : > consistant with the meaning of "raw devices". > : > : Would you be willing to make this change? > > Yes. I will make this change tomor

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
"Brian F. Feldman" wrote: > > On Fri, 30 Jul 1999, Brian F. Feldman wrote: > > > > In that case, my argument changes to: > > "There's no good reason not to have bpf in the GENERIC kernel." > > And how about having > if (securelevel > 3) > return (EPERM); > in bpf_open()?

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Wes Peters
"Jordan K. Hubbard" wrote: > > We got off onto a big tangent about switches and vlans and stuff and I > learned a number of interesting things, don't get me wrong, but we > still haven't established any consensus on the trade-offs of enabling > bpf. This wasn't meant to be a hypothetical discuss

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <19990731154458.a2...@netmonger.net> Christopher Masto writes: : I hope you mean "> 1". I often diagnose problems using tcpdump etc., : and I don't think bpf should be broken just because someone wants the : minor "flags can't be turned off" feature of level 1. Flags can't be turned of

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <19990731193410.c18...@cicely8.cicely.de> Bernd Walter writes: : Maybe a set of sysctls with a switch to off only behavour would be a : better way. Actually, a better way would be to have the interfaces to the network stack that would handle this stuff w/o needing to resort to bpf. War

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <19990731190814.a18...@cicely8.cicely.de> Bernd Walter writes: : > There are no security levels > 3. I'd be happy with > 0. This is : > consistant with the meaning of "raw devices". : That would mean you can't run a secured DHCP server :( No. That would mean you'd have to start DHCP

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <[EMAIL PROTECTED]> Bernd Walter writes: : > There are no security levels > 3. I'd be happy with > 0. This is : > consistant with the meaning of "raw devices". : That would mean you can't run a secured DHCP server :( No. That would mean you'd have to start DHCP before raising the se

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <[EMAIL PROTECTED]> Christopher Masto writes: : I hope you mean "> 1". I often diagnose problems using tcpdump etc., : and I don't think bpf should be broken just because someone wants the : minor "flags can't be turned off" feature of level 1. Flags can't be turned off at level 1, an

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Warner Losh
In message <[EMAIL PROTECTED]> Bernd Walter writes: : Maybe a set of sysctls with a switch to off only behavour would be a : better way. Actually, a better way would be to have the interfaces to the network stack that would handle this stuff w/o needing to resort to bpf. Warner To Unsubscribe:

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Christopher Masto
On Fri, Jul 30, 1999 at 05:42:57PM -0600, Warner Losh wrote: > In message > "Brian F. Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This is > consistant with

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Christopher Masto
On Fri, Jul 30, 1999 at 05:42:57PM -0600, Warner Losh wrote: > In message <[EMAIL PROTECTED]> "Brian F. >Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This i

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Bill Fumerola
On Sat, 31 Jul 1999, Ben Rosengart wrote: > > That would mean you can't run a secured DHCP server :( > > I think only the client needs BPF. Anyway, you just start the server in > the rc files, before securelevel is raised. The isc dhcp server doesn't support a -SIGHUP reload, which would mean a

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Bill Fumerola
On Sat, 31 Jul 1999, Ben Rosengart wrote: > > That would mean you can't run a secured DHCP server :( > > I think only the client needs BPF. Anyway, you just start the server in > the rc files, before securelevel is raised. The isc dhcp server doesn't support a -SIGHUP reload, which would mean

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Bernd Walter
On Sat, Jul 31, 1999 at 01:17:44PM -0400, Ben Rosengart wrote: > On Sat, 31 Jul 1999, Bernd Walter wrote: > > > That would mean you can't run a secured DHCP server :( > > I think only the client needs BPF. Anyway, you just start the server in > the rc files, before securelevel is raised. AFAIK i

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Ben Rosengart
On Sat, 31 Jul 1999, Bernd Walter wrote: > That would mean you can't run a secured DHCP server :( I think only the client needs BPF. Anyway, you just start the server in the rc files, before securelevel is raised. -- Ben UNIX Systems Engineer, Skunk Group StarMedia Network, Inc. To Unsubs

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Bernd Walter
On Fri, Jul 30, 1999 at 05:42:57PM -0600, Warner Losh wrote: > In message > "Brian F. Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This is > consistant with

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Bernd Walter
On Sat, Jul 31, 1999 at 01:17:44PM -0400, Ben Rosengart wrote: > On Sat, 31 Jul 1999, Bernd Walter wrote: > > > That would mean you can't run a secured DHCP server :( > > I think only the client needs BPF. Anyway, you just start the server in > the rc files, before securelevel is raised. AFAIK

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Ben Rosengart
On Sat, 31 Jul 1999, Bernd Walter wrote: > That would mean you can't run a secured DHCP server :( I think only the client needs BPF. Anyway, you just start the server in the rc files, before securelevel is raised. -- Ben UNIX Systems Engineer, Skunk Group StarMedia Network, Inc. To Unsub

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Bernd Walter
On Fri, Jul 30, 1999 at 05:42:57PM -0600, Warner Losh wrote: > In message <[EMAIL PROTECTED]> "Brian F. >Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This i

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Sergey Babkin
Warner Losh wrote: > > In message <37a25361.34799...@bellatlantic.net> Sergey Babkin writes: > : Disabling bpf it will break rarpd (and also rbootd but it is less > : important). I think such a thing should be mentioned in documentation. > > Not if they are started before the secure level is rais

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Sergey Babkin
Warner Losh wrote: > > In message <[EMAIL PROTECTED]> Sergey Babkin writes: > : Disabling bpf it will break rarpd (and also rbootd but it is less > : important). I think such a thing should be mentioned in documentation. > > Not if they are started before the secure level is raised. A problem i

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Daniel C. Sobral
"Jordan K. Hubbard" wrote: > > We got off onto a big tangent about switches and vlans and stuff and I > learned a number of interesting things, don't get me wrong, but we > still haven't established any consensus on the trade-offs of enabling > bpf. This wasn't meant to be a hypothetical discussi

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-31 Thread Daniel C. Sobral
"Jordan K. Hubbard" wrote: > > We got off onto a big tangent about switches and vlans and stuff and I > learned a number of interesting things, don't get me wrong, but we > still haven't established any consensus on the trade-offs of enabling > bpf. This wasn't meant to be a hypothetical discuss

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <37a25361.34799...@bellatlantic.net> Sergey Babkin writes: : Disabling bpf it will break rarpd (and also rbootd but it is less : important). I think such a thing should be mentioned in documentation. Not if they are started before the secure level is raised. Warner To Unsubscribe: s

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <[EMAIL PROTECTED]> Sergey Babkin writes: : Disabling bpf it will break rarpd (and also rbootd but it is less : important). I think such a thing should be mentioned in documentation. Not if they are started before the secure level is raised. Warner To Unsubscribe: send mail to [EMA

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
:> consistant with the meaning of "raw devices". : :Disabling bpf it will break rarpd (and also rbootd but it is less :important). I think such a thing should be mentioned in documentation. : :-SB Not if rarpd is started via the rc files... it would hook up to bpf prior to the secureleve

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Sergey Babkin
Warner Losh wrote: > > In message > "Brian F. Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This is > consistant with the meaning of "raw devices". Dis

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
:In message <9518.933378...@zippy.cdrom.com> "Jordan K. Hubbard" writes: :: > There are no security levels > 3. I'd be happy with > 0. This is :: > consistant with the meaning of "raw devices". :: :: Would you be willing to make this change? : :Yes. I will make this change tomorrow unless there

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
:> consistant with the meaning of "raw devices". : :Disabling bpf it will break rarpd (and also rbootd but it is less :important). I think such a thing should be mentioned in documentation. : :-SB Not if rarpd is started via the rc files... it would hook up to bpf prior to the securelev

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Sergey Babkin
Warner Losh wrote: > > In message <[EMAIL PROTECTED]> "Brian F. >Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This is > consistant with the meaning of

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
:In message <[EMAIL PROTECTED]> "Jordan K. Hubbard" writes: :: > There are no security levels > 3. I'd be happy with > 0. This is :: > consistant with the meaning of "raw devices". :: :: Would you be willing to make this change? : :Yes. I will make this change tomorrow unless there is signific

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <9518.933378...@zippy.cdrom.com> "Jordan K. Hubbard" writes: : > There are no security levels > 3. I'd be happy with > 0. This is : > consistant with the meaning of "raw devices". : : Would you be willing to make this change? Yes. I will make this change tomorrow unless there is sig

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> There are no security levels > 3. I'd be happy with > 0. This is > consistant with the meaning of "raw devices". Would you be willing to make this change? - Jordan To Unsubscribe: send mail to majord...@freebsd.org with "unsubscribe freebsd-hackers" in the body of the message

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message Alfred Perlstein writes: : What about the one-way sysctls that have been suggested? They need to be implemente dfirst. A quick securelevel > 0 in bpf_open would allow many people's objections to bpf in the kernel by default. Warner To Unsubscribe: send mail to majord...@freebsd.o

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Alfred Perlstein
On Fri, 30 Jul 1999, Warner Losh wrote: > In message > "Brian F. Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This is > consistant with the meaning of "raw

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message "Brian F. Feldman" writes: : And how about having : if (securelevel > 3) : return (EPERM); : in bpf_open()? There are no security levels > 3. I'd be happy with > 0. This is consistant with the meaning of "raw devices". Warner To Unsubscribe: send mail to ma

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <8605.933365...@zippy.cdrom.com> "Jordan K. Hubbard" writes: : It already is. That's not the question under discussion here - we're : talking about how to make things work in the post-installation boot : scenario. I'm in favor of having it in the kernel by default. With one proviso.

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <[EMAIL PROTECTED]> "Jordan K. Hubbard" writes: : > There are no security levels > 3. I'd be happy with > 0. This is : > consistant with the meaning of "raw devices". : : Would you be willing to make this change? Yes. I will make this change tomorrow unless there is significant obj

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> There are no security levels > 3. I'd be happy with > 0. This is > consistant with the meaning of "raw devices". Would you be willing to make this change? - Jordan To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <[EMAIL PROTECTED]> Alfred Perlstein writes: : What about the one-way sysctls that have been suggested? They need to be implemente dfirst. A quick securelevel > 0 in bpf_open would allow many people's objections to bpf in the kernel by default. Warner To Unsubscribe: send mail to

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Alfred Perlstein
On Fri, 30 Jul 1999, Warner Losh wrote: > In message <[EMAIL PROTECTED]> "Brian F. >Feldman" writes: > : And how about having > : if (securelevel > 3) > : return (EPERM); > : in bpf_open()? > > There are no security levels > 3. I'd be happy with > 0. This is > consistant with

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <[EMAIL PROTECTED]> "Brian F. Feldman" writes: : And how about having : if (securelevel > 3) : return (EPERM); : in bpf_open()? There are no security levels > 3. I'd be happy with > 0. This is consistant with the meaning of "raw devices". Warner To Unsubscr

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Warner Losh
In message <[EMAIL PROTECTED]> "Jordan K. Hubbard" writes: : It already is. That's not the question under discussion here - we're : talking about how to make things work in the post-installation boot : scenario. I'm in favor of having it in the kernel by default. With one proviso. Any place wh

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> I thought we decided that the networking gurus we're going to make it > possible to send out broadcast packets on an unconfigured interface so > that DHCP would work, so that bpf wasn't required. I believe we decided that this would be the preferred method, yes. I don't think, however, that we

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Doug
On Fri, 30 Jul 1999, Nate Williams wrote: > > This is a clear security vs functionality issue and I need to get a > > good feel for which "cause" is ascendent here in knowing which way to > > jump on the matter. Can we now hear the closing arguments from the > > pro and con folks? > > I thought

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
:> BTW, I wrote this section because a hacker actually installed the bpf :> device via the module loader during one of the root compromises at BEST, :> a year or two ago. He had gotten it from a hackers cookbook of exploits :> which he convieniently left on-disk long enough for ou

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Nate Williams
> This is a clear security vs functionality issue and I need to get a > good feel for which "cause" is ascendent here in knowing which way to > jump on the matter. Can we now hear the closing arguments from the > pro and con folks? I thought we decided that the networking gurus we're going to mak

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Mike Smith
> : But even if you turn off the bpf device, you still have /dev/mem and > : /dev/kmem to worry about. For that matter, the intruder can still write > : raw devices. Also, there is another kernel feature called kldload(8). > > BTW, I wrote this section because a hacker actually i

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
On Fri, 30 Jul 1999, Matthew Dillon wrote: > : But even if you turn off the bpf device, you still have /dev/mem and > : /dev/kmem to worry about. For that matter, the intruder can still write > : raw devices. Also, there is another kernel feature called kldload(8). > > BTW, I wr

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
: But even if you turn off the bpf device, you still have /dev/mem and : /dev/kmem to worry about. For that matter, the intruder can still write : raw devices. Also, there is another kernel feature called kldload(8). BTW, I wrote this section because a hacker actually installed t

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
On Fri, 30 Jul 1999, Brian F. Feldman wrote: > On Fri, 30 Jul 1999, Jordan K. Hubbard wrote: > > > > There's no good reason to not have bpf in at least the boot disk kernel. > > > > It already is. That's not the question under discussion here - we're > > talking about how to make things work in

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> I thought we decided that the networking gurus we're going to make it > possible to send out broadcast packets on an unconfigured interface so > that DHCP would work, so that bpf wasn't required. I believe we decided that this would be the preferred method, yes. I don't think, however, that we

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
On Fri, 30 Jul 1999, Jordan K. Hubbard wrote: > > There's no good reason to not have bpf in at least the boot disk kernel. > > It already is. That's not the question under discussion here - we're > talking about how to make things work in the post-installation boot > scenario. When did that hap

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Doug
On Fri, 30 Jul 1999, Nate Williams wrote: > > This is a clear security vs functionality issue and I need to get a > > good feel for which "cause" is ascendent here in knowing which way to > > jump on the matter. Can we now hear the closing arguments from the > > pro and con folks? > > I thought

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> There's no good reason to not have bpf in at least the boot disk kernel. It already is. That's not the question under discussion here - we're talking about how to make things work in the post-installation boot scenario. - Jordan To Unsubscribe: send mail to majord...@freebsd.org with "unsubs

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> It will let us use a dhcp client in the install programs, this is of > tremendous use to many people as DHCP starts to become much more > popular. I cannot net install a machine at home since that is on a > DHCP cable modem service. Well, just to clarify this, if you're installing a 4.0 snapsho

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
If root is compromised, that's the only way bpf can be gotten to by default. When root's compromised, if no bpf is available, the mem devices can still be created (if not there) and network queues can be listened to. And can't IFF_PROMISC be turned on too? There's no good reason to not have bpf in

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread David E. Cross
Here is a pro vote for enabling BPF in GENERIC: It will let us use a dhcp client in the install programs, this is of tremendous use to many people as DHCP starts to become much more popular. I cannot net install a machine at home since that is on a DHCP cable modem service. Also, if root is comp

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
:> BTW, I wrote this section because a hacker actually installed the bpf :> device via the module loader during one of the root compromises at BEST, :> a year or two ago. He had gotten it from a hackers cookbook of exploits :> which he convieniently left on-disk long enough for o

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Nate Williams
> This is a clear security vs functionality issue and I need to get a > good feel for which "cause" is ascendent here in knowing which way to > jump on the matter. Can we now hear the closing arguments from the > pro and con folks? I thought we decided that the networking gurus we're going to ma

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Mike Smith
> : But even if you turn off the bpf device, you still have /dev/mem and > : /dev/kmem to worry about. For that matter, the intruder can still write > : raw devices. Also, there is another kernel feature called kldload(8). > > BTW, I wrote this section because a hacker actually

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
On Fri, 30 Jul 1999, Matthew Dillon wrote: > : But even if you turn off the bpf device, you still have /dev/mem and > : /dev/kmem to worry about. For that matter, the intruder can still write > : raw devices. Also, there is another kernel feature called kldload(8). > > BTW, I w

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Matthew Dillon
: But even if you turn off the bpf device, you still have /dev/mem and : /dev/kmem to worry about. For that matter, the intruder can still write : raw devices. Also, there is another kernel feature called kldload(8). BTW, I wrote this section because a hacker actually installed

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
On Fri, 30 Jul 1999, Brian F. Feldman wrote: > On Fri, 30 Jul 1999, Jordan K. Hubbard wrote: > > > > There's no good reason to not have bpf in at least the boot disk kernel. > > > > It already is. That's not the question under discussion here - we're > > talking about how to make things work i

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
On Fri, 30 Jul 1999, Jordan K. Hubbard wrote: > > There's no good reason to not have bpf in at least the boot disk kernel. > > It already is. That's not the question under discussion here - we're > talking about how to make things work in the post-installation boot > scenario. When did that ha

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> There's no good reason to not have bpf in at least the boot disk kernel. It already is. That's not the question under discussion here - we're talking about how to make things work in the post-installation boot scenario. - Jordan To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscri

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Jordan K. Hubbard
> It will let us use a dhcp client in the install programs, this is of > tremendous use to many people as DHCP starts to become much more > popular. I cannot net install a machine at home since that is on a > DHCP cable modem service. Well, just to clarify this, if you're installing a 4.0 snapsh

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread Brian F. Feldman
If root is compromised, that's the only way bpf can be gotten to by default. When root's compromised, if no bpf is available, the mem devices can still be created (if not there) and network queues can be listened to. And can't IFF_PROMISC be turned on too? There's no good reason to not have bpf i

Re: So, back on the topic of enabling bpf in GENERIC...

1999-07-30 Thread David E. Cross
Here is a pro vote for enabling BPF in GENERIC: It will let us use a dhcp client in the install programs, this is of tremendous use to many people as DHCP starts to become much more popular. I cannot net install a machine at home since that is on a DHCP cable modem service. Also, if root is com