1 |
On 24 Feb 2006 at 17:00, pietro ferrari wrote: |
2 |
> On 2/24/06, pageexec@××××××××.hu <pageexec@××××××××.hu> wrote: |
3 |
> > On 24 Feb 2006 at 13:18, Dale Pontius wrote: |
4 |
> > > Doesn't prevent rootkits, only raises the bar. From what I've read on |
5 |
> > > the kernel list, there are still ways to get code into a running kernel, |
6 |
> > |
7 |
> > such as? |
8 |
> |
9 |
> writting directly to /dev/mem |
10 |
|
11 |
quote from an earlier post in the thread: |
12 |
|
13 |
------------------------------------------------------------------------ |
14 |
You should |
15 |
enable the /dev/mem protection feature as well, since rootkits can be |
16 |
inserted into the kernel via other methods than kernel modules. |
17 |
------------------------------------------------------------------------ |
18 |
|
19 |
this feature (among many others) has existed in grsec for many years |
20 |
now. |
21 |
|
22 |
-- |
23 |
gentoo-hardened@g.o mailing list |