[17511] in bugtraq

home help back first fref pref prev next nref lref last post

Re: OpenBSD Exploit

daemon@ATHENA.MIT.EDU (Brett Lymn)
Mon Nov 6 12:24:27 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200011060636.RAA12638@mallee.awadi>
Date:         Mon, 6 Nov 2000 17:06:19 +1030
Reply-To: Brett Lymn <blymn@BAESYSTEMS.COM.AU>
From: Brett Lymn <blymn@BAESYSTEMS.COM.AU>
X-To:         rloxley@HACKPHREAK.ORG
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <001501c04702$54ee3d60$4063abd0@bob> from "rloxley" at Nov 05,
              2000 03:28:09 AM

According to rloxley:
>
>	A very smart attacker will:
>

A smarter one will walk up to the console you assume they have
physical access to and hit the DDB hot-key sequence (this is
control-alt-escape for i386, other architectures are different).  Note
that DDB is an _option_ that is in the GENERIC kernel by default it
can be disabled by reconfiguring the kernel.  You can also prevent the
kernel from dropping to DDB on a panic by putting

options DDB_ONPANIC=0

in the kernel config and rebuilding.  Well, at least you can for
NetBSD - not sure about OpenBSD.

--
===============================================================================
Brett Lymn, Computer Systems Administrator, BAE SYSTEMS
===============================================================================

home help back first fref pref prev next nref lref last post