On Dec 27, 2013, at 5:30 PM, Chris Murphy <li...@colorremedies.com> wrote:

> 
> On Dec 27, 2013, at 4:40 PM, bruce <badoug...@gmail.com> wrote:
> 
>> Hi Chris.
>> 
>> Thanks fo.r the reply
>> .
>> The principle reason for doing/testing dual boot is to have the
>> ability to be able to do a remote reinstall for a fresh OS on a remote
>> box. If you know of a way to accomplish that, I'm more than willing to
>> hear it!!
> 
> USB key imaged with netinstl ISO is has a way to confirm it hasn't been 
> altered, and a VNC and kickstart capability for unattended installation over 
> a network.

So actually, if I have compromised a system with that USB stick pre-inserted, I 
can create a custom kernel that causes hacked install image on that media to 
pass checksum. The apparently valid checksum would seem to imply the key hasn't 
been hacked. But since it has been, my hacked kernel can install a rootkit or 
other such malware in the course of you reinstalling the system. So I think 
this is invalid short of it leveraging UEFI Secure Boot.

Chris Murphy

-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to