[17511] in bugtraq
Re: OpenBSD Exploit
daemon@ATHENA.MIT.EDU (Brett Lymn)
Mon Nov 6 12:24:27 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200011060636.RAA12638@mallee.awadi>
Date: Mon, 6 Nov 2000 17:06:19 +1030
Reply-To: Brett Lymn <blymn@BAESYSTEMS.COM.AU>
From: Brett Lymn <blymn@BAESYSTEMS.COM.AU>
X-To: rloxley@HACKPHREAK.ORG
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <001501c04702$54ee3d60$4063abd0@bob> from "rloxley" at Nov 05,
2000 03:28:09 AM
According to rloxley:
>
> A very smart attacker will:
>
A smarter one will walk up to the console you assume they have
physical access to and hit the DDB hot-key sequence (this is
control-alt-escape for i386, other architectures are different). Note
that DDB is an _option_ that is in the GENERIC kernel by default it
can be disabled by reconfiguring the kernel. You can also prevent the
kernel from dropping to DDB on a panic by putting
options DDB_ONPANIC=0
in the kernel config and rebuilding. Well, at least you can for
NetBSD - not sure about OpenBSD.
--
===============================================================================
Brett Lymn, Computer Systems Administrator, BAE SYSTEMS
===============================================================================