Alan E. Davis wrote:
I helped a friend install Ubuntu GNU/Linux on his laptop, he left
town, forgot his passwords, and I promised to breakin for him, so he
can re-do his passwords.  Told him all I have to do is run Knoppix,
access his partition, and delete the little x in the password file. Then he would reset his root password in be back in business.

He felt betrayed.  I understand why, I think: what's secure about
GNU/Linux if anyone can boot the system and reset his passwords?

That's NOT a Linux problem. If you've got physical access,
you can easily break in (same for Windows, BTW).

I said, Dunno.  I'll ask on the Gentoo list.

How can anyone easily avoid the problem of anyone being able to access
the guts of his machine using a live CD?

Remove CD-Rom.
Put Computer in a solid box which cannot (easily) be opened,
so that it's "impossible" to attach an external CD-Rom.

 I already thought of one:
use the BIOS to disallow booting from a CD or Floppy, and set a
password on the BIOS.

Most BIOS support either a "master password"
or a way to reset a password (some pins on the
motherboard).

 Don't know whether all BIOSes will allow this,
and anyway, isn't it possible on a lot of motherboards to short out
the EPROM and thus reset the password of the BIOS?

Yes.

Alexander Skwar
--
Hey Satan, didja hear the news? A war just broke out up on earth.

Meet Saddam Hussein, my new partner in evil.
--
gentoo-user@gentoo.org mailing list

Reply via email to