I don't see how it could be encrypted in the mbr. What is running at that
stage to decrypt it? Should be easy enough to check if you have a little
spare time.
On Tue, 6 Mar 2001, Martin wrote:
> Date: Tue, 06 Mar 2001 12:18:46 +1100
> From: Martin <[EMAIL PROTECTED]>
> To: Shaun Cloherty <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
> Subject: Re: [SLUG] Securing run level 1?
>
> > Storing a password in clear text in /etc/lilo.conf seems like the worst
> > possible solution. Even if I 'chmod 0600 /etc/lilo.conf' I have complete
> > faith in the ability of a determined undergraduate student, with copious
> > amounts of spare time, to find a way to subvert the file permissions. Hence
> > gaining the 'boot time' password, booting in single user mode and wreaking
> > havoc on the world at large.
>
> if you "chmod 600" /etc/lilo.conf that said student would need root
> access or a root exploit (and if they had that, why bother with the lilo
> password). if you can stay on top of any security alerts and are careful
> with what you install on the machine then you should not be more
> concerned about the students then you would be about external attacks.
> however that level of concern will always be > 0...
>
> > Perhaps I could add the password option to lilo.conf, run lilo, then remove
> > the password option... does lilo store the password on the MBR? If so, is it
> > encrypted?
>
> I know LILO normally stores everything in the MBR but i am not so sure
> about encrypting it...
>
> later
> marty
>
> --
> SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
> More Info: http://slug.org.au/lists/listinfo/slug
>
--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug