In message <[EMAIL PROTECTED]> Sean Eric Fagan writes: : if you care about security, you made the damned executable suid or : sgid. Then ktrace, ptrace, truss, and core dumps do not work. Even : if it simply does setuid(getruid()). It also disables attacking the contents of the executable by LD_LIBRARY_PATH.... Warner To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message
- Re: deny ktrace without read permissions? Greg Lehey
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? jkoshy
- Re: deny ktrace without read permissions? Sheldon Hearn
- Re: deny ktrace without read permissions? Warner Losh
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? Nate Williams
- Re: deny ktrace without read permissions? Sean Eric Fagan
- Re: deny ktrace without read permissions? jkoshy
- Re: deny ktrace without read permissions? Sean Eric Fagan
- yet more ways to attack executing binari... Warner Losh
- yet more ways to attack executing binaries (... Robert Watson
- Re: yet more ways to attack executing bi... Chris Costello
- Re: yet more ways to attack executi... jkoshy
- Re: yet more ways to attack exe... Dominic Mitchell
- Re: yet more ways to attack exe... Nate Williams
- Re: yet more ways to attack exe... Chris Costello
- Re: yet more ways to attack exe... Nate Williams
- Re: yet more ways to attack exe... Matthew Dillon

