Displaying 5 results from an estimated 5 matches for "csjp".
Did you mean:
csep
2005 Mar 12
5
FreeBSD trusted execution system: beta testers wanted
...ality similar to NetBSD's
verified exec mechanism. Once the design details of this security policy has
been solidified, I will be releasing a white paper which describes the
technical implementation in greater detail.
The mac_chkexec policy logic can be found here:
http://people.freebsd.org/~csjp/mac/trustedexec.png
Q: What is mac_chkexec?
A: It's a mandatory access control policy which ensures that if the code
contained in a binary, shell script, shared object or kernel module has
been modified from it's "trusted" form, it can not be executed. It also
ensures th...
2006 Nov 03
1
Enc: FreeBSD and the new virtual machine-based rootkits
----- Mensagem encaminhada ----
De: Ricardo A. Reis <ricardo_bsd@yahoo.com.br>
Para: security@freebsd.org
Enviadas: Sexta-feira, 3 de Novembro de 2006 10:54:14
Assunto: FreeBSD and the new virtual machine-based rootkits
Hi All,
Recently i participated in Brazil on October 2006 The FIRST/TRANSITS and
II Latin American Incident Response Conference (COLARIS).
In the II COLARIS - Joanna
2013 Jan 06
2
audit events confusion
On a rather full customer web server, I am trying to track down whose
web site script is trying to make outbound network connections when they
should not be. In /etc/security/audit_control, I added to the flags line
dir:/var/audit
flags:lo,aa,-nt
minfree:5
to log failed network connection. When I try an make an outbound
connection to something that is blocked in pf, it seems to sometimes
work.
2007 Dec 21
15
[Bug 1420] New: BSM support on Mac OS X
https://bugzilla.mindrot.org/show_bug.cgi?id=1420
Summary: BSM support on Mac OS X
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: Other
OS/Version: Mac OS X
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
AssignedTo: bitbucket at mindrot.org
2006 Sep 14
6
sshd audit not happy with ssh1 and scp
I think I've found a bug with sshd handling audit events for commands (like
scp) over ssh1 connections. Specifically, after updating to a recent FreeBSD
6.x with audit support, I'm getting log messages like these when using scp
over ssh1:
Sep 12 14:13:16 <auth.info> bm55 sshd[12335]: Accepted rsa for xxx from
A.B.C.D port 2981
Sep 12 14:13:16 <auth.crit> bm55 sshd[12335]: