On 2003-11-30, Karsten M. Self <[EMAIL PROTECTED]> wrote:
>> I recommend making it far larger than in the Debian security doc
>> though.  On my servers I have /boot and /usr read-only, and I've been
>
> You can leave /boot unmounted altogether.  The only times it needs to be
> accessed are:
>
>   - At boot time, where access is direct to partition, and the partition
>     need not be mounted (indeed, can't be).
>
>   - When examining kernel config files and System maps (read-only)
>
>   - When installing a new kernel (writeable)

Show me a good reason to separete /boot to a separate partition at 
all. What's the extra security we get out of this? 
In /boot there are only the kernel images. System.map's, kernel 
config, and GRUB config.

All that is writable only by root anyway (perms -rw-r--r-- root.root)
If an attacker get's rights to write or change perms of files there, 
he can equally easy remount the partition rw.

So what's the point? 

-- 
    Miernik         ________________________ jabber:[EMAIL PROTECTED]
___________________/__ tel: +48608233394 __/      mailto:[EMAIL PROTECTED]
Support impeaching the war criminalist George W. Bush
http://www.votetoimpeach.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to