security.7 (8596de530307b9b8316d38fad6cf9c371a45db35) security.7 (f167d7fb3e81bd884d7b76b78f1216c5afc5db3d)
1.\" Copyright (c) 1998, Matthew Dillon. Terms and conditions are those of
2.\" the BSD Copyright as specified in the file "/usr/src/COPYRIGHT" in
3.\" the source tree.
4.\"
5.\" $FreeBSD$
6.\"
7.Dd September 18, 1999
8.Dt SECURITY 7

--- 92 unchanged lines hidden (view full) ---

101.Pp
102System administrators must keep in mind that there are potentially many ways
103to break root on a machine. The attacker may know the root password,
104the attacker
105may find a bug in a root-run server and be able to break root over a network
106connection to that server, or the attacker may know of a bug in an suid-root
107program that allows the attacker to break root once he has broken into a
108user's account. If an attacker has found a way to break root on a machine,
1.\" Copyright (c) 1998, Matthew Dillon. Terms and conditions are those of
2.\" the BSD Copyright as specified in the file "/usr/src/COPYRIGHT" in
3.\" the source tree.
4.\"
5.\" $FreeBSD$
6.\"
7.Dd September 18, 1999
8.Dt SECURITY 7

--- 92 unchanged lines hidden (view full) ---

101.Pp
102System administrators must keep in mind that there are potentially many ways
103to break root on a machine. The attacker may know the root password,
104the attacker
105may find a bug in a root-run server and be able to break root over a network
106connection to that server, or the attacker may know of a bug in an suid-root
107program that allows the attacker to break root once he has broken into a
108user's account. If an attacker has found a way to break root on a machine,
109.Pa the attacker may not have a need to install a backdoor.
109the attacker may not have a need to install a backdoor.
110Many of the root holes found and closed to date involve a considerable amount
111of work by the hacker to cleanup after himself, so most hackers do install
112backdoors. This gives you a convienient way to detect the hacker. Making
113it impossible for a hacker to install a backdoor may actually be detrimental
114to your security because it will not close off the hole the hacker found to
115break in in the first place.
116.Pp
117Security remedies should always be implemented with a multi-layered

--- 585 unchanged lines hidden ---
110Many of the root holes found and closed to date involve a considerable amount
111of work by the hacker to cleanup after himself, so most hackers do install
112backdoors. This gives you a convienient way to detect the hacker. Making
113it impossible for a hacker to install a backdoor may actually be detrimental
114to your security because it will not close off the hole the hacker found to
115break in in the first place.
116.Pp
117Security remedies should always be implemented with a multi-layered

--- 585 unchanged lines hidden ---