Data security Was: SSH

Craig White craigwhite at azapple.com
Fri Dec 9 02:24:04 UTC 2005


On Thu, 2005-12-08 at 21:09 -0500, Leonard Isham wrote:
> On 12/8/05, Danny Terweij - Net Tuning | Net <d.terweij at nettuning.net> wrote:
> >
> > From: "Terry Polzin" <fox3ec208 at wideopenwest.com>
> >
> >
> > >I'd boot into rescue mode and vi the /etc/shadow file and remove the
> > passwords
> > >then reboot normal.  The accounts will then have no password and then you
> > >could generate your own passwords.
> >
> >
> > Eeks!. I thought linux was better then windows with passwords security.
> >
> > So when your laptop/server/pc is stolen all they have to do is this and gets
> > full access as root with no pass?
> >
> > Next question, how to prevent this ?
> >
> 
> Welcome.  Now tou know why physical security is a must.  Encryption
> with a strong passphrase.  There is support for encrytped loopbacks. 
> THe options and details are quite lengthy.  Google and you will find
> articles and how-to's onthe subject.  Also google PGP and GPG
> (http://www.gnupg.org/) for more information.
----
there is the ability to require a boot password for grub but generally,
if you can boot from a cd, you can still access files.

Then of course, you can boot into runlevel 1 instead of 'rescue mode'
and change passwords

Then of course, you probably shouldn't edit /etc/shadow directly but
rather simply issue 'passwd USER_NAME' even in runlevel 1 mode to reset
passwords.

Craig




More information about the fedora-list mailing list