[1138] in bugtraq
Re[4]: snooper watchers
daemon@ATHENA.MIT.EDU (Nayfield, Rod)
Wed Mar 1 11:31:36 1995
Date: Wed, 01 Mar 95 09:21:57 EST
From: "Nayfield, Rod" <rnayfield@mail.iconnet.com>
To: Karl Strickland <karl@bagpuss.demon.co.uk>
Cc: proff@suburbia.apana.org.au, jna@concorde.com, bugtraq@fc.net
Right, but everyone removes openprom support so people don't evilly
put in a security password on you, right? :)
rod
______________________________ Reply Separator _________________________________
Subject: Re: Re[2]: snooper watchers
Author: Karl Strickland <karl@bagpuss.demon.co.uk> at Internet
Date: 3/1/95 9:11 AM
>
> The best thing to do is take the nit support out of the kernel and
> remove /dev/nit. Now someone would have to build a new kernel and
> reboot the machine to replace the nit support.
>
> If you are overly concerned about this, you can set the boot device
> (in the rom monitor on a sparc) to boot off of some other disk, one
> that is not bootable or not there. Then a reboot/fastboot/shutdown
> -r/etc will not be able to automatically bring the system up. I don't
> believe that you can specify boot devices from a unix reboot type
> command.
is it not possible for a hacker to set his own boot device before performing his
reboot, and then reset it back to whatever-it-was later? ie by messing with
/dev/openprom or whatever its called