Why don't you have a look in the startup scripts and instead of running
the shell run sulogin instead?

On Tue, 6 Mar 2001, Shaun Cloherty wrote:

> Date: Tue, 06 Mar 2001 11:51:00 +1100
> From: Shaun Cloherty <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: Re: [SLUG] Securing run level 1?
> 
> Martin wrote:
> 
> > you can password protect LILO, so that no options can be passed at the
> > prompt without supplying the password...
> 
> Storing a password in clear text in /etc/lilo.conf seems like the worst
> possible solution. Even if I 'chmod 0600 /etc/lilo.conf' I have complete
> faith in the ability of a determined undergraduate student, with copious
> amounts of spare time, to find a way to subvert the file permissions. Hence
> gaining the 'boot time' password, booting in single user mode and wreaking
> havoc on the world at large.
> 
> Perhaps I could add the password option to lilo.conf, run lilo, then remove
> the password option... does lilo store the password on the MBR? If so, is it
> encrypted?
> 
> 
> > you will also want to password protect the bios to prevent people from
> > booting off floppies etc. and bypassing your security
> 
> Yes, this is our current policy.
> 
> Shaun
> 
> --
> Shaun Cloherty
> Graduate School of Biomedical Engineering
> University of New South Wales
> 
> 
> 
> 
> -- 
> SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
> More Info: http://slug.org.au/lists/listinfo/slug
> 


-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to