Re: disk-destroyer.c

Jochen Striepe (j.striepe@tu-bs.de)
Sat, 22 Jul 2000 12:27:02 +0200


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

On 21 Jul 2000, David A. Wagner <daw@cs.berkeley.edu> wrote:
>
> Ahh, but you've set up an impossible burden. It is _impossible_
> for the kernel to ensure that a malicious hacker who has obtained
> root on your machine does not destroy your hardware. After all,
> that hacker can always re-install an old, unsafe kernel version
> and ioctl() away, or even bit-bang directly to the raw device!

IMHO you can avoid this by booting from read-only media. Of course you
should lock the server room's door ;-)
Just my 2 pence...

Regards,

Jochen Striepe.

- --
FAQ zur Newsgroup at.linux:
<http://alfie.ist.org/LinuxFAQ/>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5eXbnm3eMyUx1sM4RAsdGAJwKmycGLX1D/IufZVhnxTeiYb68igCdGWeu
0wwd5v81VBphajW2AP37sSs=
=0WNw
-----END PGP SIGNATURE-----

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/