Re: Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-12 Thread Thilo Six
Nicolas Deschildre wrote the following on 12.11.2007 11:04 <<-snip->> > This is EOT for me. > > Nicolas Nicolas if i sound rude in my last mail i apologize for that. bye -- Thilo key: 0x4A411E09 -- Ubuntu-devel-discuss mailing list Ubuntu-devel-discuss@lists.ubuntu.com Modify settings or

Re: Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-12 Thread Nicolas Deschildre
On Nov 12, 2007 2:15 PM, Scott James Remnant <[EMAIL PROTECTED]> wrote: > On Sat, 2007-11-10 at 14:06 +0800, Nicolas Deschildre wrote: [...] > > For the simplest installations, GRUB could perhaps read /etc/shadow and > accept any user's password -- but that would be error-prone, open to > exploit

Re: Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-11 Thread Scott James Remnant
On Sat, 2007-11-10 at 14:06 +0800, Nicolas Deschildre wrote: > But then, why not use this password feature by default to avoid anyone > to edit boot parameter and become root? > Because it adds a level of complexity without a significant gain. The additional complexity is that users would have t

Re: Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-11 Thread Jan Claeys
Op zaterdag 10-11-2007 om 14:06 uur [tijdzone +0800], schreef Nicolas Deschildre: > But then, why not use this password feature by default to avoid anyone > to edit boot parameter and become root? In addition to what was mentioned already: GRUB only knows about plain us keyboards, while many/most

Re: Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-11 Thread Thilo Six
Nicolas Deschildre wrote the following on 11.11.2007 07:22 > On 11/10/07, Thilo Six <[EMAIL PROTECTED]> wrote: >> Nicolas Deschildre wrote the following on 10.11.2007 07:06 >> >> <<-snip->> >> >>> Thanks for the pointer. >>> But then, why not use this password feature by default to avoid anyone >>>

Re: Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-10 Thread Nicolas Deschildre
On 11/10/07, Thilo Six <[EMAIL PROTECTED]> wrote: > Nicolas Deschildre wrote the following on 10.11.2007 07:06 > > <<-snip->> > > > Thanks for the pointer. > > But then, why not use this password feature by default to avoid anyone > > to edit boot parameter and become root? > > because it´s as easy

Re: Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-10 Thread Thilo Six
Nicolas Deschildre wrote the following on 10.11.2007 07:06 <<-snip->> > Thanks for the pointer. > But then, why not use this password feature by default to avoid anyone > to edit boot parameter and become root? because it´s as easy as to plugin a LiveCD and overcome that. -- Thilo key: 0x4A4

Password-protect grub interactive commands (was: rationale of root access from boot)

2007-11-09 Thread Nicolas Deschildre
On Nov 4, 2007 6:35 PM, Oystein Viggen <[EMAIL PROTECTED]> wrote: > * ["Nicolas Deschildre"] > > > My point was not about the parameter itself. My point was about the > > ability to edit the kernel parameters while booting. > > IIRC lilo won't allow you that. > > http://www.gnu.org/software/grub/ma

Re: rationale of root access from boot

2007-11-04 Thread Oystein Viggen
* ["Nicolas Deschildre"] > My point was not about the parameter itself. My point was about the > ability to edit the kernel parameters while booting. > IIRC lilo won't allow you that. http://www.gnu.org/software/grub/manual/html_node/Security.html Lilo has a similar password feature, but no dis

Re: rationale of root access from boot

2007-11-04 Thread Nicolas Deschildre
On 11/4/07, Paul <[EMAIL PROTECTED]> wrote: > try init=/bin/bash, now do you think Linux is insecure because it has an > init parameter? My point was not about the parameter itself. My point was about the ability to edit the kernel parameters while booting. IIRC lilo won't allow you that. > > Op

rationale of root access from boot

2007-11-03 Thread Nicolas Deschildre
hi! I was wondering about the rationale of allowing anyone to easily boot root (by adding the 'single' parameter to the kernel command line with grub). While I can understand it on a server, which must be physically protected to be really secure, IMO it is pretty bad on workstations. I know that