Nicolas Deschildre wrote the following on 12.11.2007 11:04
<<-snip->>
> This is EOT for me.
>
> Nicolas
Nicolas if i sound rude in my last mail i apologize for that.
bye
--
Thilo
key: 0x4A411E09
--
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or
On Nov 12, 2007 2:15 PM, Scott James Remnant <[EMAIL PROTECTED]> wrote:
> On Sat, 2007-11-10 at 14:06 +0800, Nicolas Deschildre wrote:
[...]
>
> For the simplest installations, GRUB could perhaps read /etc/shadow and
> accept any user's password -- but that would be error-prone, open to
> exploit
On Sat, 2007-11-10 at 14:06 +0800, Nicolas Deschildre wrote:
> But then, why not use this password feature by default to avoid anyone
> to edit boot parameter and become root?
>
Because it adds a level of complexity without a significant gain.
The additional complexity is that users would have t
Op zaterdag 10-11-2007 om 14:06 uur [tijdzone +0800], schreef Nicolas
Deschildre:
> But then, why not use this password feature by default to avoid anyone
> to edit boot parameter and become root?
In addition to what was mentioned already: GRUB only knows about plain
us keyboards, while many/most
Nicolas Deschildre wrote the following on 11.11.2007 07:22
> On 11/10/07, Thilo Six <[EMAIL PROTECTED]> wrote:
>> Nicolas Deschildre wrote the following on 10.11.2007 07:06
>>
>> <<-snip->>
>>
>>> Thanks for the pointer.
>>> But then, why not use this password feature by default to avoid anyone
>>>
On 11/10/07, Thilo Six <[EMAIL PROTECTED]> wrote:
> Nicolas Deschildre wrote the following on 10.11.2007 07:06
>
> <<-snip->>
>
> > Thanks for the pointer.
> > But then, why not use this password feature by default to avoid anyone
> > to edit boot parameter and become root?
>
> because it´s as easy
Nicolas Deschildre wrote the following on 10.11.2007 07:06
<<-snip->>
> Thanks for the pointer.
> But then, why not use this password feature by default to avoid anyone
> to edit boot parameter and become root?
because it´s as easy as to plugin a LiveCD and overcome that.
--
Thilo
key: 0x4A4
On Nov 4, 2007 6:35 PM, Oystein Viggen <[EMAIL PROTECTED]> wrote:
> * ["Nicolas Deschildre"]
>
> > My point was not about the parameter itself. My point was about the
> > ability to edit the kernel parameters while booting.
> > IIRC lilo won't allow you that.
>
> http://www.gnu.org/software/grub/ma
* ["Nicolas Deschildre"]
> My point was not about the parameter itself. My point was about the
> ability to edit the kernel parameters while booting.
> IIRC lilo won't allow you that.
http://www.gnu.org/software/grub/manual/html_node/Security.html
Lilo has a similar password feature, but no dis
On 11/4/07, Paul <[EMAIL PROTECTED]> wrote:
> try init=/bin/bash, now do you think Linux is insecure because it has an
> init parameter?
My point was not about the parameter itself. My point was about the
ability to edit the kernel parameters while booting.
IIRC lilo won't allow you that.
>
> Op
hi!
I was wondering about the rationale of allowing anyone to easily boot
root (by adding the 'single' parameter to the kernel command line with
grub).
While I can understand it on a server, which must be physically
protected to be really secure, IMO it is pretty bad on workstations.
I know that
11 matches
Mail list logo