Sean Eric Fagan wrote about the security implications of making the bpf device
the default in GENERIC etc.

> I'm sorry, but that's a complete non-issue:
> 
> 1.  /dev/bpf0 is mode 400, root.wheel -- to read it, you need to break root.
> 2.  If you can break root, you can rebuild a kernel with BPF *anyway*.

Sorry - I disagree with that...

We run an ISP on FreeBSD, and we'd damn well notice someone _rebooting_ (or
even trying to reboot one of our machines (to get their new kernel to work
it's magic) - Heck, our machines _don't_ reboot from a 'shutdown -r'! -
they're AST's! :)

Whilst the argument about removing the source tree / kernel source etc. has
always been pretty mute (what hackers not worth their salt don't come
prepared? :) - I don't like the idea of every root exploiter just being able
to 'instantly' sit there and run BPF! (Without even things like tripwire
having a chance of detecting a kernel change).

I'd much rather having the hacker either blocked from doing this, or having to
spend time doing it (e.g. getting the source / new kernel to the machine etc.
- the longer the better)...

I think having bpf compiled in by default is going to be a Bad Move (tm). It
_usually_ follows if some new user has the ability to recompile the kernel
with it 'in' - they have enough sense to know the implications, put it in by
default and you'll be giving every root hacker (or box where root access is
sadly routine - and I know probably shouldn't be) an instant christmas present
on those kind of machines...

(I know theres probably ways of doing this with kern_secure_level, but that
defaults to 'NO' at the moment :)

Just my $0.04! (and no, it's not on fire... :)

-Kp

To Unsubscribe: send mail to majord...@freebsd.org
with "unsubscribe freebsd-current" in the body of the message

Reply via email to