On Wed, Aug 5, 2009 at 11:15 PM, Corey<co...@bitworthy.net> wrote:
> On Wednesday 05 August 2009 19:42:54 Anthony Sorace wrote:
>> > * I hope I don't get beat up on this one (well, I hope I don't get too
>> > beat up on _any_ of these questions...), but it seems strange that
>> > something as important as a cpu/auth server would just go and boot up
>> > right into the hostowner... apparently this a non issue - so what am I
>> > not understanding?
>>
>> philosophy. plan9, like research unix before it, recognizes that if
>> you have physical access to the box, all bets are off anyway.
>>
>
> Well, sounds like a flawed philosophy taken too far.
>
> Flawed, because all bets are not necessarily off with physical access;
> and taken too far, because... dang, what harm is there in providing
> that last means of interference to a hostile?
>
> Cpu/Fs/Auth server says: "If you can touch me, I'm _all_ yours..."
>
> What a fascinatingly... loose... form of security, if you catch my drift.
>
>
>> security consists of locking your door.
>>
>
> ... which means bootes is just a quick hacksaw or boltcutter or
> crowbar away... so why even bother with a locked door?
>
> Security is ultimately about the price/time/effort/skills a potential
> attacker (or vandal) is willing (and able) to put forth in order to overcome
> a system's security measures. A password is amazingly effective for a
> vast number of the most common circumstances encountered in many
> typical environments.
>

I argued this once too, but eventually came around to the Plan 9 way
of thinking. Once you have physical access to the machine, it's yours
anyway. Just boot the Plan 9 CD and mount the fossil or any of the
other possibilities that arise when you are able to physically insert
bootable media into a system and force it to reboot.

If your Linux system is sitting out, oh no, there's a big scary login
prompt! First thing I try is rebooting and adding "single" to the end
of the kernel options. If that doesn't work, I grab a bootable Linux
CD, boot it, and mount your filesystem. Unless you're encrypting the
disk (probability: low), it's all mine now.

I don't remember the procedure, but I'm pretty sure VMS (reputedly one
of the most secure OSes, if not the most secure OS, in use today) has
a similar option for bypassing the console password on boot, and of
course you can always steal the disk and take it elsewhere, mount a
new boot tape, etc.


John
-- 
"Object-oriented design is the roman numerals of computing" -- Rob Pike

Reply via email to