Hi Penguin gurus,
During my job, I will be installing Linux on public nodes "kiosks". The
thing is, those nodes will have wifi network access, and will *not* have
physical security around them (read: no guards). The problem is: People
might try to get the info stored on the disks, either through network
access, physical access, or through stealing the disks
Target: I want to make it as hard as possible for those people. I totally
understand that without physical security, there's no way it can be really
"secure". I just wanna make real difficult

Protecting console:
- I will turn off all login ttys and turn off X
- Will password protect grub

Protecting Wifi:
- Will turn off ssh, and firewall all ports that are not providing end user
services (I will mostly just leave apache open)


Protecting stolen disks:
Here comes the part where I have no clue! I don't really want this to be
(steal disk, mount disk, copy data!!). I wanna make it difficult, but I have
no idea how. Here are some ideas I'm toying with
- Encrypt disks with some "auto-decrypting" scheme, so the machine can boot
without entering a password?
- Use some non standard filesystem ? (Dont like it, the system needs to be
reliable)
- Use some weird non standard partitioning tools ?(Also don't like it)
- Use some non standard grub chain-loader that will decrypt Linux disks and
boot them ?

I'm a bit lost, did anyone face this dilemma before ? Any experiences to
share ?
Again, please don't tell me there's no way to get real security, if I don't
have physical security. I totally understand this. I just don't wanna make
this as easy as steal/mount!

Best Regards
_______________________________________________
rhelv5-list mailing list
rhelv5-list@redhat.com
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to