LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 11-23-2005, 10:14 PM   #1
MetroidFan2002
LQ Newbie
 
Registered: Mar 2005
Location: VA
Posts: 8

Rep: Reputation: 0
Physical Security


Hi all,

I'm using Mandrake 10.1 and while I haven't really tried to "lock down" my Windows partition, it is still password protected with only administrator (group) access. Yet Mandrake 10.1 can read all the files on the partition without even batting an eye at the prospect of having a password. Similarily, I can use Explore 2fs on my Windows partition and not have to enter the root password for Mandrake?!

Well, my question really becomes, is there a way to secure the partitions so that other partitions cannot read from them without knowing the passwords? Or is physical security (i.e. having to be able to physically access the computer) just not as important as distributed security in this computing environment of today?
 
Old 11-23-2005, 11:09 PM   #2
cs-cam
Senior Member
 
Registered: May 2004
Location: Australia
Distribution: Gentoo
Posts: 3,545

Rep: Reputation: 57
The only way that I know of is to use an encrypted filesystem. I'm no expert in this area though so wait for somebody with a clue to follow close behind
 
Old 11-23-2005, 11:12 PM   #3
slantoflight
Member
 
Registered: Aug 2005
Distribution: Smoothwall
Posts: 283
Blog Entries: 3

Rep: Reputation: 35
Just edit the fstab and change the ownership of your windows partition to root or other authorized user. As for 2fs being able to explore your files, you'll just have to unplug your drive

It is possible to lock your drive, but not individual partitions.

Last edited by slantoflight; 11-23-2005 at 11:16 PM.
 
Old 11-23-2005, 11:15 PM   #4
MetroidFan2002
LQ Newbie
 
Registered: Mar 2005
Location: VA
Posts: 8

Original Poster
Rep: Reputation: 0
Quote:
Originally posted by slantoflight
Just edit the fstab and change the ownership of your windows partition to root or other authorized user.
No, that's not what I meant.

What I mean is, if someone shows up with a "live" windows or linux cd, could they make a dump of the files on a linux or windows system respectively without ever knowing the password?

Your solution would hide it from Mandrake but it would be a user-enforced hiding from Linux. I'm wondering if Windows can hide it directly, and if Linux can hide its files (or at least require a password) from Explore 2fs.
 
Old 11-23-2005, 11:17 PM   #5
slantoflight
Member
 
Registered: Aug 2005
Distribution: Smoothwall
Posts: 283
Blog Entries: 3

Rep: Reputation: 35
Use hdparm to lock your drive, then install windows on seperate drive and do the same. Your only hope is lock things at pre filesystem level.

I have locked seagate harddrive, i lost the password and have'nt been able to use it since. So its fairly effective.

Last edited by slantoflight; 11-23-2005 at 11:23 PM.
 
Old 11-24-2005, 12:06 AM   #6
masonm
Senior Member
 
Registered: Mar 2003
Location: Following the white rabbit
Distribution: Slackware64 -current
Posts: 2,300

Rep: Reputation: 90
encryption
 
Old 11-24-2005, 01:20 AM   #7
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Change your bios settings so that cdrom isn't an optional boot device and set a bios password. Anyone wishing to boot via cdrom will need the password. This can be bypassed as well by cracking open the case and pulling the bios battery. That's where the "physical" in "physical security" comes into play. Most cases now come with a built-in cases lock or at least a set of brackets that can be physically locked. If your running linux on these systems then you should also set a boot loader password as well so that a user can't pass kernel options during boot (like boot into single usermode for example).
 
Old 11-24-2005, 02:43 AM   #8
slantoflight
Member
 
Registered: Aug 2005
Distribution: Smoothwall
Posts: 283
Blog Entries: 3

Rep: Reputation: 35
I find that computer cases are generally easy to crack.
I guess this is a little overboard. But you could put you're motherboard in an expensive very thick walled safe.

Bios password protect your pc. Make sure your unlocked harddrive contains an OS that can unlocked your other harddrives. Make that primary boot drive. Get rid of optional cdrom/floppy drive boot. Lock your harddrives when they're not in use. Password protect your bootloader. Use a different password for each harddrive. Encrypt every single file you can encrypt. In fact, use a self-encrypting filesystem and then password encrypt your files on top of that.

Then install the case in a completely submerged, air-locked,motion detecting room. This will render any conventional means of breaking into your safe electronic, heat, virtually impossible. Your external computer equipment will naturally need to be waterproofed. You will also need an oxygen tank.

Make it so that only you can enter the room,unscathed. Perhaps a special belt thats emits an encrypted radio signal. If a person thats not wearing the belt enters the room, you room signals a death trap. Preferably a very well targeted one. You don't want to have the sour luck of some unwanted intruder entering your room(very unlikely) and have your death trap take you down as well. Also as side note, your belt will have the ability to drain the water out of your room, if you plan on staying a prolonged time.

Ofcourse the door will have all levels of intrusion detection as well, including a basic password, voice recognition, retinal scan, dna sample, and fingerprint verification. The door will also have an automatic 15 minute shutdown feature, if any invalid combination of these items is entered.



Now a couple of obvious questions may arise

Can't a person with a proffesional high-grade welder(who has stolen or duplicated my belt) break through my case or my door?

Very unlikely, as anything hot enough to melt your safe is'nt going to be something a thief/hacker can put in his backpocket and carry around without looking just a bit suspicious. And explosives are too loud and sloppy.

But just in case:
Have temperature alarms on your case/door. If it gets too hot or too cold, have it trigger a death trap.

You could have it wire to alarm the police as well. But cops are'nt 100% garraunteed. Besides, you want a self contained solution as possible, without the threat of human flaws.

Can't a person use acid to corrode my case and/or door and steal my motherboard?

Another unlikely threat. Acid is very slow. And it would probably take hundreds of years to break through your foot thick titanium door.

Ahhh, but what if the person has a time machine?

But just case:

If possible put a self cleaning mechanism on your door. Such as waterfall on your door, that can be deactivated once you enter your codes/dna/voice recognition.(for your convience)
 
Old 11-24-2005, 06:39 PM   #9
MetroidFan2002
LQ Newbie
 
Registered: Mar 2005
Location: VA
Posts: 8

Original Poster
Rep: Reputation: 0
So what you all are saying is,
1. Encrypt the entire hard drive so even if the files are read they're gibberish
2. Lock the drive before filesystem is in place
3. Disable boot from CD.

So, I guess the answer is that neither Linux nor Windows provides physical security to their partions, something else has to take care of it?
 
Old 11-24-2005, 11:36 PM   #10
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
If a person thats not wearing the belt enters the room, you room signals a death trap. Preferably a very well targeted one.
Personally I recommend trained sharks, with frickin' laser beams on their heads of course . Lots of ninjas can be very effective as well

So, I guess the answer is that neither Linux nor Windows provides physical security to their partions, something else has to take care of it?
As was stated earlier, using encrypted partitions would work as well. If someone did manage to cut through a case lock with a welding torch or bolt cutters without anyone in the data center noticing, then they'd see jibberish on the partition when they tried to mount it with the live cd. Both windows and linux offer a number of solutions for encypting entire drives or partitions.
 
Old 11-25-2005, 09:53 AM   #11
slantoflight
Member
 
Registered: Aug 2005
Distribution: Smoothwall
Posts: 283
Blog Entries: 3

Rep: Reputation: 35
Ahh shark with lasers beams, I almost forgot about those.

Lets not forget, they'll have a hard time unlocking those harddrives in the first place. But not to worry, you can put an eletrocuting mechanism on your drive bay.

Plus if you spread out your encrypting filesystem over a raid array, if you're top secret computer is'nt acting as server(it really should'nt), you can routinely remove a drive or two as soon as your done with it.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Less physical memory? ariek Debian 5 07-21-2005 02:23 PM
Physical memsize reejadb04 Linux - Hardware 2 03-15-2005 09:36 AM
get Physical memory in C/C++ Dreampainter Programming 1 10-30-2004 08:54 PM
physical name IcyHot Linux - General 12 11-01-2001 04:36 PM
Physical Address yangh66 Linux - Networking 2 06-19-2001 08:01 AM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 12:08 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration