Re: FreeBSD and User Security

2008-06-14 Thread Zane C.B.
On Wed, 11 Jun 2008 22:25:32 +0200 David Naylor [EMAIL PROTECTED] wrote: Hi All, Today I read an article describing how my government had lost ZAR200 000 000 from fraud. This is just under $25 000 000. The article credited this loss largely due to the use of spyware. My question is

Re: FreeBSD and User Security

2008-06-12 Thread Wojciech Puchar
David It is my understanding that since 1995 all computers must have a hardware back door that permits undetectable access by the government to the computer. This capability can be implemented using System Monitor(Maintenance) Mode which is built into all x86 computers now. It would appear

Re: FreeBSD and User Security

2008-06-12 Thread perryh
How do you know that the bios has not been reflashed by a virus, trojan, or rootkit? For that matter, how do you know that the *original* bios was free of interesting non-essentials? It's been a few years since bios were delivered in socketed ROMs/EPROMs (readable by a standalone device,

Re: FreeBSD and User Security

2008-06-12 Thread perryh
It is my understanding that since 1995 all computers must have a hardware back door that permits undetectable access by the government to the computer. This capability can be implemented using System Monitor(Maintenance) Mode which is built into all x86 computers now. It would

Re: FreeBSD and User Security

2008-06-12 Thread dfeustel
On Thu, Jun 12, 2008 at 01:03:00AM -0700, [EMAIL PROTECTED] wrote: How do you know that the bios has not been reflashed by a virus, trojan, or rootkit? For that matter, how do you know that the *original* bios was free of interesting non-essentials? It's been a few years since bios were

Re: FreeBSD and User Security

2008-06-12 Thread Wojciech Puchar
of interesting non-essentials? It's been a few years since bios were delivered in socketed ROMs/EPROMs (readable by a standalone device, independently of their own operation) or since sources were typically published :) now they are standard devices too, just not socketed, you may unsolder and

Re: FreeBSD and User Security

2008-06-12 Thread David Naylor
On Wednesday 11 June 2008 23:47:43 you wrote: On Wed, Jun 11, 2008 at 10:25:32PM +0200, David Naylor wrote: Hi All, Today I read an article describing how my government had lost ZAR200 000 000 from fraud. This is just under $25 000 000. The article credited this loss largely due to

Re: FreeBSD and User Security

2008-06-12 Thread Frank Shute
On Wed, Jun 11, 2008 at 10:25:32PM +0200, David Naylor wrote: Hi All, Today I read an article describing how my government had lost ZAR200 000 000 from fraud. This is just under $25 000 000. The article credited this loss largely due to the use of spyware. My question is how secure

Re: FreeBSD and User Security

2008-06-12 Thread Jeffrey Goldberg
On Jun 12, 2008, at 8:19 AM, David Naylor wrote: I think this argument is rather mute, just because there are no programs exploiting security vulnerabilities does not been there are not vulnerabilities, But it is far from moot if you are interested in the actual threat against your

Re: FreeBSD and User Security

2008-06-12 Thread Wojciech Puchar
But it is far from moot if you are interested in the actual threat against your system. In a sense, using a less popular OS is a form of security by obscurity which is not to be heavily relied on, but still it does make a real, practical, difference in the case that you described. FreeBSD

Re: FreeBSD and User Security

2008-06-12 Thread David Naylor
On Thursday 12 June 2008 18:43:40 you wrote: On Jun 12, 2008, at 8:19 AM, David Naylor wrote: I think this argument is rather mute, just because there are no programs exploiting security vulnerabilities does not been there are not vulnerabilities, But it is far from moot if you are

Re: FreeBSD and User Security

2008-06-12 Thread Jeffrey Goldberg
On Jun 12, 2008, at 3:24 PM, David Naylor wrote: This is a general enquiry. What had sparked my interest in this subject is the above mentioned article. In this case it is a workstation used to access and manage account and cash flows. The threat would be anyone gaining access to

FreeBSD and User Security

2008-06-11 Thread David Naylor
Hi All, Today I read an article describing how my government had lost ZAR200 000 000 from fraud. This is just under $25 000 000. The article credited this loss largely due to the use of spyware. My question is how secure is FreeBSD (including KDE, GNOME and XFCE) to attacks, including

Re: FreeBSD and User Security

2008-06-11 Thread Wojciech Puchar
from fraud. This is just under $25 000 000. The article credited this loss largely due to the use of spyware. My question is how secure is FreeBSD (including KDE, GNOME and XFCE) to do not include that programs to FreeBSD. they are not it's part. it's just few of thousand programs that can

Re: FreeBSD and User Security

2008-06-11 Thread Roland Smith
On Wed, Jun 11, 2008 at 10:25:32PM +0200, David Naylor wrote: Hi All, Today I read an article describing how my government had lost ZAR200 000 000 from fraud. This is just under $25 000 000. The article credited this loss largely due to the use of spyware. My question is how secure

Re: FreeBSD and User Security

2008-06-11 Thread YANSWBVCG
On Wed, Jun 11, 2008 at 10:25:32PM +0200, David Naylor wrote: Hi All, Today I read an article describing how my government had lost ZAR200 000 000 from fraud. This is just under $25 000 000. The article credited this loss largely due to the use of spyware. My question is how secure

Re: FreeBSD and User Security

2008-06-11 Thread Jeffrey Goldberg
[mailed and posted] On Jun 11, 2008, at 4:03 PM, YANSWBVCG wrote: It is my understanding that since 1995 all computers must have a hardware back door that permits undetectable access by the government to the computer. This capability can be implemented using System Monitor(Maintenance) Mode

Re: FreeBSD and User Security

2008-06-11 Thread dfeustel
On Wed, Jun 11, 2008 at 06:53:18PM -0500, Jeffrey Goldberg wrote: [mailed and posted] On Jun 11, 2008, at 4:03 PM, YANSWBVCG wrote: It is my understanding that since 1995 all computers must have a hardware back door that permits undetectable access by the government to the computer. This

Re: FreeBSD and User Security

2008-06-11 Thread Jeffrey Goldberg
On Jun 11, 2008, at 7:17 PM, [EMAIL PROTECTED] wrote: A relatively new security threat known as 'The Blue Pill', based upon hardware, is a class of virtual rootkits that can silently take over Intel and AMD systems. A good site to visit to learn about these virtual rootkits is

Re: FreeBSD and User Security

2008-06-11 Thread dfeustel
On Wed, Jun 11, 2008 at 07:45:51PM -0500, Jeffrey Goldberg wrote: On Jun 11, 2008, at 7:17 PM, [EMAIL PROTECTED] wrote: A relatively new security threat known as 'The Blue Pill', based upon hardware, is a class of virtual rootkits that can silently take over Intel and AMD systems. A good site

Re: FreeBSD and User Security

2008-06-11 Thread cpghost
On Wed, 11 Jun 2008 19:45:51 -0500 Jeffrey Goldberg [EMAIL PROTECTED] wrote: On Jun 11, 2008, at 7:17 PM, [EMAIL PROTECTED] wrote: A relatively new security threat known as 'The Blue Pill', based upon hardware, is a class of virtual rootkits that can silently take over Intel and AMD

Re: FreeBSD and User Security

2008-06-11 Thread Jeffrey Goldberg
On Jun 11, 2008, at 8:08 PM, cpghost wrote: On Wed, 11 Jun 2008 19:45:51 -0500 Jeffrey Goldberg [EMAIL PROTECTED] wrote: First it should consume memory. A very complete test of memory through a modified memtest should be able to detect whether system reported memory is accurate. What if

Re: FreeBSD and User Security

2008-06-11 Thread dfeustel
On Wed, Jun 11, 2008 at 08:51:16PM -0500, Jeffrey Goldberg wrote: On Jun 11, 2008, at 8:08 PM, cpghost wrote: On Wed, 11 Jun 2008 19:45:51 -0500 Jeffrey Goldberg [EMAIL PROTECTED] wrote: First it should consume memory. A very complete test of memory through a modified memtest should be

Re: FreeBSD and User Security

2008-06-11 Thread Jeffrey Goldberg
On Jun 11, 2008, at 9:05 PM, [EMAIL PROTECTED] wrote: On Wed, Jun 11, 2008 at 08:51:16PM -0500, Jeffrey Goldberg wrote: The next time I reboot the one server I've got with an SVM capable processor I'm going to disconnect the power (to make sure that I'm getting a real reboot instead of a