Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Boyd Stephen Smith Jr.
On Sunday 16 April 2006 06:54, "Alan E. Davis" <[EMAIL PROTECTED]> wrote 
about '[gentoo-user] Security from non-authorized logins':
> I helped a friend install Ubuntu GNU/Linux on his laptop, he left
> town, forgot his passwords, and I promised to breakin for him, so he
> can re-do his passwords.  Told him all I have to do is run Knoppix,
> access his partition, and delete the little x in the password file.
> Then he would reset his root password in be back in business.
>
> He felt betrayed.  I understand why, I think: what's secure about
> GNU/Linux if anyone can boot the system and reset his passwords?

First of all, you can't have it both ways.  Either there's a way to get 
into your system without your password(s) or you are screwed when you 
forget your password.

Second, any OS that doesn't hold it's password file on an encrypted area 
protected by some other master password, is subject to the same attack.  
Sometimes there's more "security by obscurity" to deal with, but that only 
has to be dealt with once.  (For example, "rooting" a Windows box requires 
tools that are a bit more specialized than a text editor.)

> Oh, well, does anyone have anything to suggest or to say about this?

You can set your BIOS so that only device X is bootable, but there's two 
ways around that.  Since you have physical access, you can either (a) 
exchange the media hooked to device X or (b) short the reset pins / remove 
the MB battery to reset the BIOS to factory defaults.  Either might 
require opening the case, but are pretty easy to do.  Also, it really easy 
to forget BIOS passwords since they aren't needed that often.

Now, okay, so lets work under the assumption that the attacker has full 
control over your boot process.  They can load any OS they want so even if 
they have no /other/ way to access your data, they can simply read it byte 
by byte off of the hard drive.  They can also write to the hard drive, so 
they could replace your secure software with insecure or malicious 
software (assuming the can read the software enough to know how to modify 
it).  [The same can be said for transforming innocuous data to 
incriminating data.] Even if they don't have enough access to modify your 
software, they could just overwrite the HD and deprive you of the data.

Now, while we can't prevent vandals from destroying your data, it is 
possible to encrypt everything on your HD 'cept for the kernel and just 
enough user-space tools to start the decryption.  This prevents the 
attacker from stealing the data, and also prevents an attacker from 
replacing your secure software with insecure or malicious software (they 
don't know where/what to write).  The keys are protected by a password; 
without the password NO ONE can get them, so DON'T LOSE THE PASSWORD.

Finally, I do want to take this opportunity to mention one of the 
possible /benefits/ of TPM / TCM / "Treacherous" Computing.  Assuming you 
have the keys to your computer, it will only load BIOSes that you've 
allowed which will only load kernels you've allowed, which give you 
control over you boot process again -- encryption will still be necessary 
to safeguard against your HD simply being stolen, but TPM/TCM is does 
close a few holes.  (Of course, this is not how MS etc. want TPM/TCM 
implemented; they are looking at a system design where /THEY/ own the keys 
to your computer.)

-- 
"If there's one thing we've established over the years,
it's that the vast majority of our users don't have the slightest
clue what's best for them in terms of package stability."
-- Gentoo Developer Ciaran McCreesh


pgpbTa1oSPK2b.pgp
Description: PGP signature


Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Norberto Bensa
Alan E. Davis wrote:
> He felt betrayed.  I understand why, I think: what's secure about
> GNU/Linux if anyone can boot the system and reset his passwords?

Oh C'mon! Like you NEVER did the same on a Windows box. YES, you can do 
something similar on NT/2K/XP/Whatever... 

Encrypt your filesystems if you want a little more security on a physically 
accessible computer.


Regards,
-- 
Norberto Bensa
Cel: 5654-9539
Ciudad de Buenos Aires, Argentina



pgprOmt2ceOln.pgp
Description: PGP signature


Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Rumen Yotov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,
Alan E. Davis wrote:
> Still, it would perhaps be somewhat comforting to be able to disable
> EASY access to a "mission critical" system.
> 
> What about further disabling of access to /etc/passwd?  Does SELinux
> take any such steps?  (Ok, I could look into this by reading TFM. 
> Apologies).
> 
> Alan
> 
Not very sure about SELinux, but RSBAC has in-kernel user management (in
it's latest releases >=1.2.5).
IIRC SELinux also uses it's own user management beside the unix one
(check selinux docs).
PS: but the data is still there, so use encryption (enc. partition)
...SKIP...
HTH.Rumen
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2-ecc0.1.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD4DBQFEQknRNbtuTtsWD3wRAiRcAJUSlX2s64RHOnwM81YVnFGwdKEJAJ0akEt5
WUbbRd2/9Rmwqxwm0ntq6w==
=6tVw
-END PGP SIGNATURE-
-- 
gentoo-user@gentoo.org mailing list



Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Alexander Skwar

Alan E. Davis wrote:

Still, it would perhaps be somewhat comforting to be able to disable
EASY access to a "mission critical" system.


Put them in a server room. Make sure, that only trusted people
have a key to that server room.


What about further disabling of access to /etc/passwd?  Does SELinux
take any such steps?


Well, how does SElinux help, if a (non-SELinux) boot medium
is used to access the system?

And what do you do, if you "forget" the password to your
mission critical system? Where are the backdoors? Are the
backdoors documented (they better be...)?

Alexander Skwar
--
Totally illogical, there was no chance.
-- Spock, "The Galileo Seven", stardate 2822.3
--
gentoo-user@gentoo.org mailing list



Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Alan E. Davis
Still, it would perhaps be somewhat comforting to be able to disable
EASY access to a "mission critical" system.

What about further disabling of access to /etc/passwd?  Does SELinux
take any such steps?  (Ok, I could look into this by reading TFM. 
Apologies).

Alan

On 4/16/06, Alexander Skwar <[EMAIL PROTECTED]> wrote:
> Alan E. Davis wrote:
> > I helped a friend install Ubuntu GNU/Linux on his laptop, he left
> > town, forgot his passwords, and I promised to breakin for him, so he
> > can re-do his passwords.  Told him all I have to do is run Knoppix,
> > access his partition, and delete the little x in the password file.
> > Then he would reset his root password in be back in business.
> >
> > He felt betrayed.  I understand why, I think: what's secure about
> > GNU/Linux if anyone can boot the system and reset his passwords?
>
> That's NOT a Linux problem. If you've got physical access,
> you can easily break in (same for Windows, BTW).
>
> > I said, Dunno.  I'll ask on the Gentoo list.
> >
> > How can anyone easily avoid the problem of anyone being able to access
> > the guts of his machine using a live CD?
>
> Remove CD-Rom.
> Put Computer in a solid box which cannot (easily) be opened,
> so that it's "impossible" to attach an external CD-Rom.
>
> >  I already thought of one:
> > use the BIOS to disallow booting from a CD or Floppy, and set a
> > password on the BIOS.
>
> Most BIOS support either a "master password"
> or a way to reset a password (some pins on the
> motherboard).
>
> >  Don't know whether all BIOSes will allow this,
> > and anyway, isn't it possible on a lot of motherboards to short out
> > the EPROM and thus reset the password of the BIOS?
>
> Yes.
>
> Alexander Skwar
> --
> Hey Satan, didja hear the news? A war just broke out up on earth.
>
> Meet Saddam Hussein, my new partner in evil.
> --
> gentoo-user@gentoo.org mailing list
>
>

-- 
gentoo-user@gentoo.org mailing list



Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Alexander Skwar

Alan E. Davis wrote:

I helped a friend install Ubuntu GNU/Linux on his laptop, he left
town, forgot his passwords, and I promised to breakin for him, so he
can re-do his passwords.  Told him all I have to do is run Knoppix,
access his partition, and delete the little x in the password file. 
Then he would reset his root password in be back in business.


He felt betrayed.  I understand why, I think: what's secure about
GNU/Linux if anyone can boot the system and reset his passwords?


That's NOT a Linux problem. If you've got physical access,
you can easily break in (same for Windows, BTW).


I said, Dunno.  I'll ask on the Gentoo list.

How can anyone easily avoid the problem of anyone being able to access
the guts of his machine using a live CD?


Remove CD-Rom.
Put Computer in a solid box which cannot (easily) be opened,
so that it's "impossible" to attach an external CD-Rom.


 I already thought of one:
use the BIOS to disallow booting from a CD or Floppy, and set a
password on the BIOS.


Most BIOS support either a "master password"
or a way to reset a password (some pins on the
motherboard).


 Don't know whether all BIOSes will allow this,
and anyway, isn't it possible on a lot of motherboards to short out
the EPROM and thus reset the password of the BIOS?


Yes.

Alexander Skwar
--
Hey Satan, didja hear the news? A war just broke out up on earth.

Meet Saddam Hussein, my new partner in evil.
--
gentoo-user@gentoo.org mailing list



Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Jed R. Mallen
On 4/16/06, Willie Wong <[EMAIL PROTECTED]> wrote:
> On Sun, Apr 16, 2006 at 09:54:33PM +1000, Penguin Lover Alan E. Davis 
> squawked:
> > He felt betrayed.  I understand why, I think: what's secure about
> > GNU/Linux if anyone can boot the system and reset his passwords?
>
> That is the same regardless of operating system.
> Physical access == no security.
>
> > How can anyone easily avoid the problem of anyone being able to access
> > the guts of his machine using a live CD?  I already thought of one:
> > use the BIOS to disallow booting from a CD or Floppy, and set a
> > password on the BIOS.  Don't know whether all BIOSes will allow this,
> > and anyway, isn't it possible on a lot of motherboards to short out
> > the EPROM and thus reset the password of the BIOS?
>
> You can also encrypt the contents of your hard drive.
>   http://tldp.org/HOWTO/Disk-Encryption-HOWTO/

But I can still get that hard drive and smash it to bits ;)

Get a big dog. Tie him next to your PC.

Seriously, if your friend can find an OS that can restrict access even
if the attacker has physical access to the PC, then he should use
that.

Encryption is a good solution, even for backups. But it's a bit
overboard for most users.
--
Jed R. Mallen
GPG key ID: 81E575A3 fp: 4E1E CBA5 7E6A 2F8B 8756  660A E54C 39D6 81E5 75A3
http://jed.sitesled.com

-- 
gentoo-user@gentoo.org mailing list



Re: [gentoo-user] Security from non-authorized logins

2006-04-16 Thread Willie Wong
On Sun, Apr 16, 2006 at 09:54:33PM +1000, Penguin Lover Alan E. Davis squawked:
> He felt betrayed.  I understand why, I think: what's secure about
> GNU/Linux if anyone can boot the system and reset his passwords?

That is the same regardless of operating system. 
Physical access == no security.

> How can anyone easily avoid the problem of anyone being able to access
> the guts of his machine using a live CD?  I already thought of one:
> use the BIOS to disallow booting from a CD or Floppy, and set a
> password on the BIOS.  Don't know whether all BIOSes will allow this,
> and anyway, isn't it possible on a lot of motherboards to short out
> the EPROM and thus reset the password of the BIOS?

You can also encrypt the contents of your hard drive. 
  http://tldp.org/HOWTO/Disk-Encryption-HOWTO/

W

-- 
Q: What's an anagram of "Banach-Tarski" ?

A: "Banach-Tarski Banach-Tarski"
Sortir en Pantoufles: up 155 days,  4:42
-- 
gentoo-user@gentoo.org mailing list



[gentoo-user] Security from non-authorized logins

2006-04-16 Thread Alan E. Davis
I helped a friend install Ubuntu GNU/Linux on his laptop, he left
town, forgot his passwords, and I promised to breakin for him, so he
can re-do his passwords.  Told him all I have to do is run Knoppix,
access his partition, and delete the little x in the password file. 
Then he would reset his root password in be back in business.

He felt betrayed.  I understand why, I think: what's secure about
GNU/Linux if anyone can boot the system and reset his passwords?

I said, Dunno.  I'll ask on the Gentoo list.

How can anyone easily avoid the problem of anyone being able to access
the guts of his machine using a live CD?  I already thought of one:
use the BIOS to disallow booting from a CD or Floppy, and set a
password on the BIOS.  Don't know whether all BIOSes will allow this,
and anyway, isn't it possible on a lot of motherboards to short out
the EPROM and thus reset the password of the BIOS?

Of course, if he would forget his password he would lose all his data.

Oh, well, does anyone have anything to suggest or to say about this?

Alan Davis

-- 
gentoo-user@gentoo.org mailing list