Martin wrote:

> you can password protect LILO, so that no options can be passed at the
> prompt without supplying the password...

Storing a password in clear text in /etc/lilo.conf seems like the worst
possible solution. Even if I 'chmod 0600 /etc/lilo.conf' I have complete
faith in the ability of a determined undergraduate student, with copious
amounts of spare time, to find a way to subvert the file permissions. Hence
gaining the 'boot time' password, booting in single user mode and wreaking
havoc on the world at large.

Perhaps I could add the password option to lilo.conf, run lilo, then remove
the password option... does lilo store the password on the MBR? If so, is it
encrypted?


> you will also want to password protect the bios to prevent people from
> booting off floppies etc. and bypassing your security

Yes, this is our current policy.

Shaun

--
Shaun Cloherty
Graduate School of Biomedical Engineering
University of New South Wales




-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to