Chris..

>>>>
I already gave you the proper grub.conf 2nd entry. That's what you got
wrong and why it won't boot. It's pointing to the wrong root which is
what I said from the beginning.
<<<

Right, but I'm not sure what I need to correct in the Install GUI for
the 2nd OS Install process in order to match what you posted.

In particular, do I simply select the sda for the boot partition?



On Fri, Dec 27, 2013 at 7:30 PM, Chris Murphy <li...@colorremedies.com> wrote:
>
> On Dec 27, 2013, at 4:40 PM, bruce <badoug...@gmail.com> wrote:
>
>> Hi Chris.
>>
>> Thanks fo.r the reply
>> .
>> The principle reason for doing/testing dual boot is to have the
>> ability to be able to do a remote reinstall for a fresh OS on a remote
>> box. If you know of a way to accomplish that, I'm more than willing to
>> hear it!!
>
> USB key imaged with netinstl ISO is has a way to confirm it hasn't been 
> altered, and a VNC and kickstart capability for unattended installation over 
> a network.
>
>
>> Everything I've seen regarding doing reinstalling of OS, requires
>> having access to the box, with fresh media.
>
> Well it is easier to do it that way, completely remote setups have more fail 
> points. You ultimately need the ability to get physical access to it anyway - 
> hard drive dies, etc.
>
>>
>> This is really intended to allow me to detect if the "base/master"
>> system has been hacked, and then to immeadiately switch to the minimal
>> OS/system, which would then invoke a netinstall for the hacked
>> system/OS to have a clean system.
>
> I'm not a security expert or a lawyer, but this use case seems specious. 
> Firstly, in any business use case it seems to me the machine needs to be 
> preserved for forensic analysis. You shouldn't just obliterate it and 
> reinstall, that's destruction of evidence, it very well could be illegal.
>
> In any case, if the primary system is hacked, the minimal system is also 
> likely compromised. If it has write once media in it, like a CD/DVD,  you can 
> create known reliable media that can boot a live environment from which you 
> can ATA Secure Erase the drives, and reinstall a system. But this isn't dual 
> boot in the sense that there are two OS's on one physical drive.
>
>> So, the test is to have a dual Centos process, which is what I'm
>> looking to implement right now.
>
> Maybe someone with more security and VM experience can speak up. But it seems 
> to me that the setup and management of all of this is a lot easier if you 
> have a rather locked down baremetal setup, and then you have one or more 
> virtual machines that are more "exposed". And if they get hacked, it's a ton 
> more straightforward to preserve its virtual disk, point the VM to a backup 
> image, replace keys and passwords, and get it up and running in minutes vs 
> hours for a truly clean install of a baremetal setup.
>
>
>> Here are the current steps I've used, feel free to tell me where I've
>> gone off track.
>
> I already gave you the proper grub.conf 2nd entry. That's what you got wrong 
> and why it won't boot. It's pointing to the wrong root which is what I said 
> from the beginning.
>
>
>
> Chris Murphy
>
> --
> users mailing list
> users@lists.fedoraproject.org
> To unsubscribe or change subscription options:
> https://admin.fedoraproject.org/mailman/listinfo/users
> Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
> Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
> Have a question? Ask away: http://ask.fedoraproject.org
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to