LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-21-2008, 06:19 PM   #1
theunixwizard
Member
 
Registered: Feb 2008
Distribution: Ubuntu,Fedora,PC-BSD,FreeBSD
Posts: 116

Rep: Reputation: 15
Linux Paranoid Security


I have a laptop that I have all of my confidential data
in. And this will(if stolen)be my third stolen laptop from
my office. I was wondering if it is possible to set the login
manager so that if there is let's say 15 incorrect logins back to back
then could it overwrite the hda1 with trash
 
Old 04-21-2008, 06:28 PM   #2
IsaacKuo
Senior Member
 
Registered: Apr 2004
Location: Baton Rouge, Louisiana, USA
Distribution: Debian Stable
Posts: 2,546
Blog Entries: 8

Rep: Reputation: 465Reputation: 465Reputation: 465Reputation: 465Reputation: 465
It'll be too late after 15 incorrect logins. Someone who wants to get at your data will simply boot up a liveCD or remove the hard drive. The only real solution is to encrypt the hard drive. I'm not familiar with how this is done, precisely.
 
Old 04-21-2008, 06:36 PM   #3
theunixwizard
Member
 
Registered: Feb 2008
Distribution: Ubuntu,Fedora,PC-BSD,FreeBSD
Posts: 116

Original Poster
Rep: Reputation: 15
Linux Parannoid Secuirty

I agree that is too many but lets say 6 back to back
I already have to hard drive encrypted with I think that
it is called LVS? Here is a list of my security on that laptop
1: BIOS Password
2: LVS
3: strong root password
4: x doesn't start on boot (init 2)
5: Files is hid in system files under usbconfig(no in any major
directories)
Do you think I have enough or need more

Last edited by theunixwizard; 04-21-2008 at 06:43 PM. Reason: stupid mistakes
 
Old 04-22-2008, 01:08 AM   #4
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by theunixwizard View Post
I have a laptop that I have all of my confidential data
in. And this will(if stolen)be my third stolen laptop from
my office. I was wondering if it is possible to set the login
manager so that if there is let's say 15 incorrect logins back to back
then could it overwrite the hda1 with trash
Quote:
Originally Posted by theunixwizard View Post
I agree that is too many but lets say 6 back to back
I already have to hard drive encrypted with I think that
it is called LVS? Here is a list of my security on that laptop
1: BIOS Password
2: LVS
3: strong root password
4: x doesn't start on boot (init 2)
5: Files is hid in system files under usbconfig(no in any major
directories)
Do you think I have enough or need more
I'm sure you can make it so that after X login attempts your disk starts to get trashed (personally, I'm not familiar with how to do that, though). But as has already been said, that would be almost pointless if the reason someone is stealing your laptop is to get your data. They will either boot live CD (and mount your disk), or simply connect your disk to another computer. Therefore, having your disk encrypted is the only effective measure you can take. Neither strong passwords, nor BIOS passwords, nor not having X11 auto-start is going to be of any help as far as protecting your data from someone with physical access to your hard drive. Since you aren't sure whether your disk is encrypted or not (which tells me it's not), then perhaps you should boot a live CD, have it auto-mount all your partitions, and see things from the point of view of your attacker.
 
Old 04-22-2008, 03:33 AM   #5
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,070

Rep: Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897
Quote:
let's say 15 incorrect logins back to back
then could it overwrite the hda1 with trash
Please, no. This is so dangerous if something goes wrong, please don't; it will bite you later.

Encrypt your data and try to protect you laptop against theft. (Err, and have a good backup procedure, use it, and test it.)
 
Old 04-22-2008, 10:42 AM   #6
czarr
Member
 
Registered: Apr 2008
Distribution: Arch
Posts: 36

Rep: Reputation: 15
i don't know what LVS is but a quick search turned up
"Linux Virtual Server (LVS) is an advanced load balancing solution for Linux systems"
which...isn't encryption. As mentioned, erasing your data after failed logins is totally pointless and will just lead to your data getting accidentally deleted. Once your hard drive is properly encrypted (i use LUKS in Archlinux but search for a solution for your distro) your partitions will simply not mount until the correct password is given. With a strong passphrase it would take (arbitrarily high number)a decade for NASA to crack into your system and will prove a million times more useful for protecting your data. Don't forget to encrypt your backups too!

edit: and your bios password will be circumvented with a reset on the motherboard. Even if you're hard drive is welded to the frame of your laptop and can't be removed AND you have disabled booting from usb & cd in the bios it makes little difference to the security of your data. The password will just be reset by anyone with physical access.
And i think hiding your personal files within the system is just an inconvience for you...if i was looking for them i'd just search for files owned by you or that were recently modified. They could be owned by root and have -noatime set in fstab but i'm sure theres a million other ways to easily find your personal files as well, i'm still a noob.

So encryption is definetly what you need (probobly the only thing other than a strong root password) but also be aware its not perfect and there are various hypothetical ways someone could still get your data.

Last edited by czarr; 04-22-2008 at 10:54 AM.
 
Old 04-22-2008, 11:00 AM   #7
IsaacKuo
Senior Member
 
Registered: Apr 2004
Location: Baton Rouge, Louisiana, USA
Distribution: Debian Stable
Posts: 2,546
Blog Entries: 8

Rep: Reputation: 465Reputation: 465Reputation: 465Reputation: 465Reputation: 465
I think he's actually talking about LVM, which does have options for encrypting file systems (not by default, though).

The Debian installer has the option to install directly to an encrypted LVM. I don't know if the Fedora installer has that ability yet (last I checked, only Debian had this option).
 
Old 04-22-2008, 02:38 PM   #8
theunixwizard
Member
 
Registered: Feb 2008
Distribution: Ubuntu,Fedora,PC-BSD,FreeBSD
Posts: 116

Original Poster
Rep: Reputation: 15
Linux Paranoid Security

Yes it is LVM(I cant spell). It is a Debain Distro.
When I was installing it I told it not to encrypt.
Does anybody know how to do it with out having to reinstall?
 
Old 04-22-2008, 02:45 PM   #9
IsaacKuo
Senior Member
 
Registered: Apr 2004
Location: Baton Rouge, Louisiana, USA
Distribution: Debian Stable
Posts: 2,546
Blog Entries: 8

Rep: Reputation: 465Reputation: 465Reputation: 465Reputation: 465Reputation: 465
I don't know how, but somebody else did it: http://linuxgazette.net/140/kapil.html

He shows step by step how he converted an existing Debian setup to encrypted LVM. Not having tried it myself, I can't vouch for those instructions.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Paranoid Data Security!! elliotfuller Linux - Networking 3 08-26-2005 12:46 AM
What's a good distro if I'm really paranoid about security/viruses? Mr. Hill Linux - Newbie 12 02-23-2005 10:59 PM
How do I set Linux to Paranoid Mode? maanmadrasto Linux - Security 6 01-16-2004 02:50 PM
Maxiumum (paranoid) security LGMike Mandriva 3 09-25-2003 12:27 AM
Paranoid security raybcher Linux - Security 3 08-29-2003 07:54 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:26 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration