> consider this (I'm trying to make a network more secure) :
> A user enters grub upon bootup and hits "e" to edit the Linux boot 
> procedure and then continues to boot into single user mode, and he 
> then chagnes the root password to whatever he suits.... the user who 
> did this is eventually tracked down and taken care of.
>
> Now, how would I prevent this from happening in future instances?

Although not foolproof, a collection of the previous suggestions would require someone 
to spend a bit of effort to access the system:

1. Physically lock down the box, there are accessories made for this. 
http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=computer+locks

2. Depending on budget, install a tamper alarm (uses light sensors, etc)

3. Password protect the bios

4. Disable booting from anything but the hdd in bios (or disable external drives all 
together).

5. Password grub.

6. Set grub to require root pass for single user mode.

...and/or, from a social engineering point of view

1. Have management inform users that security violations will get them fired.  Someone 
would have a rough time claiming that they "didn't know".

2. Have HR implement and explain a signed policy upon hiring having users agree they 
will be held financially liable for any intentional security violations or accessing 
systems without permission.

Reply via email to