Neil Bothwick wrote:
> On Sat, 09 May 2009 08:15:09 -0500, Dale wrote:
>
>   
>> I was talking about with just a plain file system.  I read in a install
>> guide somewhere when I was installing ages ago that having /boot on a
>> separate partition, and not always mounted, was a good security
>> practice.  That way no one could alter the kernel since it was not
>> mounted. 
>>     
>
> That's a bit of a red herring IMO. If anyone can alter your kernel they
> can mount the filesystem. The argument about protecting the kernel from
> corruption is similarly spurious, since you always have a spare copy
> in /usr/src/linux anyway. The main reason for doing this was because some
> BIOSes could work past cylinder 1024 of a drive, so you needed to ensure
> the kernel was on a filesystem fully within that area.
>
> If it were a security issue, then the Gentoo handbook would have
> recommended this practice for all architectures, not just x86-based ones.
>
>
>   

That was my thoughts as well.  You have to be root to get to the kernel
and alter/copy it and if you are root, you can mount it anyway.  No real
point.

I do get the old BIOSes tho.  That was a issue for a good while.

Dale

:-)  :-) 

Reply via email to