Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I installed Debian on this new laptop Asus x50gl.
Debian will not boot into a GUI, it will only start with black screen, console mode.
GDM is running, dpkg-reconfigure doesn't solve the problem. Can't get X to run. The laptop has an nvidia graphics card.
So, I installed Ubuntu. It works, well. They are nearly the same. So I thought, mount Debian, compare the xorg.confs, gdm.conf, etc, maybe I can get Debian going.
My question is: is it not a security breach if I can mount Debian, change things, save the changes, basically do what I want with what should be a separate system? Not that I have anything to hide, just out of principle.
I installed Debian on this new laptop Asus x50gl.
Debian will not boot into a GUI, it will only start with black screen, console mode.
GDM is running, dpkg-reconfigure doesn't solve the problem. Can't get X to run. The laptop has an nvidia graphics card.
So, I installed Ubuntu. It works, well. They are nearly the same. So I thought, mount Debian, compare the xorg.confs, gdm.conf, etc, maybe I can get Debian going.
My question is: is it not a security breach if I can mount Debian, change things, save the changes, basically do what I want with what should be a separate system? Not that I have anything to hide, just out of principle.
It's not a breach, because you are doing it to your own system. It would be a breach if someone else would do that - either by remotely accessing your Ubuntu (and gaining elevated privileges) or by having physical access to your box. In both of those cases, the actual breach isn't the mounting of the Debian partition, but rather the gaining of the ability to do so. What you have described is totally normal and expected behavior. It's the same principle used by rescue CDs (you mount any disk partitions you wish to work with). In fact, you could have done what you did by simply using the Ubuntu CD's live environment - without actually having to install Ubuntu.
My question is: is it not a security breach if I can mount Debian, change things, save the changes, basically do what I want with what should be a separate system?
If, rather than 'breach' you mean 'risk', then yes it is. If, for example, you left your laptop on the train, as seems to be in accordance with Government guidelines here, then someone could put in a Live CD. What happens then depends on stuff like bios options and encryption, but you should certainly think about the risk.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.