Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place! |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
07-15-2018, 05:56 PM
|
#1
|
LQ Newbie
Registered: Jul 2018
Posts: 6
Rep: 
|
Secure Live USB (Mint) for online banking
Hey, just installed. I'm trying to keep the system as secure as possible (to use for online banking transactions) so I decided to only run it in live (read only) mode. Is it possible to install security updates and set restore points while only running in livemode? I get this error :
The repository 'cdrom://Linux Mint 19 _Tara_ - Release amd64 20180626 bionic Release' does not have a Release file.
When I search for updates using update manager. Thanks for the help!
|
|
|
07-16-2018, 11:12 AM
|
#2
|
Senior Member
Registered: Mar 2009
Location: Earth, unfortunately...
Distribution: Currently: OpenMandriva. Previously: openSUSE, PCLinuxOS, CentOS, among others over the years.
Posts: 3,881
|
Quote:
Originally Posted by id3k
Hey, just installed. I'm trying to keep the system as secure as possible (to use for online banking transactions) so I decided to only run it in live (read only) mode. Is it possible to install security updates and set restore points while only running in livemode? I get this error :
The repository 'cdrom://Linux Mint 19 _Tara_ - Release amd64 20180626 bionic Release' does not have a Release file.
When I search for updates using update manager. Thanks for the help!
|
With "persistence", yes it is possible to keep changes to the file system. Otherwise everything is loaded into RAM (memory) and then is lost when you shutdown or restart the machine.
The error you refer to seems to suggest that it's looking for the "release file" on a CD/DVD and not on the USB.
https://en.wikipedia.org/wiki/Live_USB
https://en.wikipedia.org/wiki/Persis...puter_science)
Last edited by jsbjsb001; 07-16-2018 at 11:17 AM.
|
|
|
07-16-2018, 01:13 PM
|
#3
|
Moderator
Registered: Mar 2008
Posts: 22,361
|
I'd use a different distro myself.
I'd install it as a regular install and not a live usb with persistence.
You can't properly install many of the security updates to a squash file and that is where the kernel resides.
I'd also be sure to encrypt at least home.
I don't get the restore points exactly. Running BtRFS one could set points in file time.
|
|
|
07-16-2018, 05:54 PM
|
#4
|
LQ Newbie
Registered: Jul 2018
Posts: 6
Original Poster
Rep: 
|
Quote:
Originally Posted by jefro
I'd use a different distro myself.
|
What distro would you use? why?
Quote:
Originally Posted by jefro
I'd install it as a regular install and not a live usb with persistence.
You can't properly install many of the security updates to a squash file and that is where the kernel resides.
|
Are you saying that I won't be able to complete certain updates because they rely on kernel access which isn't(?) allowed in persistence mode?
Not sure if you can explain or point me to a source, but how/why does this work?
Quote:
Originally Posted by jefro
I'd also be sure to encrypt at least home.
|
Pretty sure home is the only thing I can encrypt if I'm dual-booting with another OS right?
Quote:
Originally Posted by jefro
I don't get the restore points exactly. Running BtRFS one could set points in file time.
|
Definitely gonna keep googling this, because although I know what it is, still not quite sure how to use it...
EDIT: Formatting
Thanks for the help guys 
Last edited by id3k; 07-16-2018 at 05:56 PM.
Reason: Formatting
|
|
|
07-16-2018, 06:07 PM
|
#5
|
LQ Guru
Registered: Jan 2005
Location: USA and Italy
Distribution: Debian testing/sid; OpenSuSE; Fedora; Mint
Posts: 5,524
|
The /etc/apt/sources.list file only contains the install CD, or iso, as an apt source. If you try to use apt, and it can't find the CD, nothing will work. If you want the ultimate security in online banking, you would not want persistence or an actual install. You would want the system to forget everything each reboot.
One other way to do this is with a VM. You make a snapshot first thing, and every time you start the VM you revert to the snapshot. That way any keyloggers, remote-control trojans, rootkits, and whatever else might get on the system magically vanish each time the VM is booted.
|
|
|
07-16-2018, 06:41 PM
|
#6
|
LQ Newbie
Registered: Jul 2018
Posts: 6
Original Poster
Rep: 
|
Quote:
Originally Posted by AwesomeMachine
The /etc/apt/sources.list file only contains the install CD, or iso, as an apt source. If you try to use apt, and it can't find the CD, nothing will work. If you want the ultimate security in online banking, you would not want persistence or an actual install. You would want the system to forget everything each reboot.
One other way to do this is with a VM. You make a snapshot first thing, and every time you start the VM you revert to the snapshot. That way any keyloggers, remote-control trojans, rootkits, and whatever else might get on the system magically vanish each time the VM is booted.
|
Wouldn't doing this prevent me from being able to install any security updates?
|
|
|
07-16-2018, 07:55 PM
|
#7
|
LQ Guru
Registered: Jan 2005
Location: USA and Italy
Distribution: Debian testing/sid; OpenSuSE; Fedora; Mint
Posts: 5,524
|
Yes, but the chances that a security update will help you more than reverting back to a virgin system is small. Security updates are to counter exploits allowing ne'er-do-wells to plant the very files I suggested you would have no fear of if you revert back to the snapshot each boot.
For instance, if you missed a security update that prevents installation of a keylogger, and it was mischievously installed, it might log some keystrokes, but then it would be gone on the next boot. So, there would be nothing to retrieve. You could still do security updates once a month or so, but not do anything else during the session, make a new snapshot, and revert to 'that' snapshot from then on.
|
|
|
07-16-2018, 09:47 PM
|
#8
|
LQ Newbie
Registered: Jul 2018
Posts: 6
Original Poster
Rep: 
|
Quote:
Originally Posted by AwesomeMachine
Yes, but the chances that a security update will help you more than reverting back to a virgin system is small. Security updates are to counter exploits allowing ne'er-do-wells to plant the very files I suggested you would have no fear of if you revert back to the snapshot each boot.
For instance, if you missed a security update that prevents installation of a keylogger, and it was mischievously installed, it might log some keystrokes, but then it would be gone on the next boot. So, there would be nothing to retrieve. You could still do security updates once a month or so, but not do anything else during the session, make a new snapshot, and revert to 'that' snapshot from then on.
|
Would running mint of the usb in live mode (never installing) do the same thing without a VM? and then use the VM to update, then repeat?
|
|
|
07-17-2018, 05:07 AM
|
#9
|
LQ Guru
Registered: Apr 2008
Distribution: Slackware, Ubuntu, PCLinux,
Posts: 11,432
|
I would think it would be better to do an actual install to the usb with a complex user password and as suggested above, an encrypted /home partition.
Generally as you know, a Live system even with persistence has no password so anyone with passing familiarity with Linux (knowledge of root/sudo) can do anything s/he wants if they have access to the persistent usb including removing software and deleting data.
Apparently, it is possible to create another user with password on a Live/persistent usb. The link below, particularly the post by 'sudodus' explains doing it with the mkusb software. It's available in the Ubuntu repositories, not sure if it will work with Mint but it might.
https://askubuntu.com/questions/8698...is-it-possible
If you plan to use the same Live/persistent usb for any length of time, you will definitely need to create a persistent partition with a Linux filesystem. If you use some of the basic tools for creating a Live usb, they use FAT32 filesystems so you re limited to 4GB.
|
|
|
07-17-2018, 05:09 AM
|
#10
|
LQ Guru
Registered: Apr 2008
Distribution: Slackware, Ubuntu, PCLinux,
Posts: 11,432
|
I would think it would be better to do an actual install to the usb with a complex user password and as suggested above, an encrypted /home partition.
Generally as you know, a Live system even with persistence has no password so anyone with passing familiarity with Linux (knowledge of root/sudo) can do anything s/he wants if they have access to the persistent usb including removing software and deleting data.
Apparently, it is possible to create another user with password on a Live/persistent usb. The link below, particularly the post by 'sudodus' explains doing it with the mkusb software. It's available in the Ubuntu repositories, not sure if it will work with Mint but it might.
https://askubuntu.com/questions/8698...is-it-possible
|
|
|
07-17-2018, 03:11 PM
|
#11
|
Moderator
Registered: Mar 2008
Posts: 22,361
|
I'd use a more secure distro and one that has only the minimal programs needed to do your task. At least consider CentOS.
Updates can't re-write the squashfs live. You'd have to unsquash and then re-squash from some build update.
I don't mind the idea of a full unwriteable distro but it leaves you unprotected at first security update. You could build one secure distro and update it and apply it to a live image.
You can encrypt most of a usb drive.
Might be quicker and easier to run a VM too.
The question becomes do you want to keep it up to date?
Last edited by jefro; 07-17-2018 at 03:12 PM.
|
|
|
07-18-2018, 08:17 PM
|
#12
|
LQ Newbie
Registered: Jul 2018
Posts: 6
Original Poster
Rep: 
|
Quote:
Originally Posted by jefro
I'd use a more secure distro and one that has only the minimal programs needed to do your task. At least consider CentOS.
Updates can't re-write the squashfs live. You'd have to unsquash and then re-squash from some build update.
I don't mind the idea of a full unwriteable distro but it leaves you unprotected at first security update. You could build one secure distro and update it and apply it to a live image.
You can encrypt most of a usb drive.
Might be quicker and easier to run a VM too.
The question becomes do you want to keep it up to date?
|
Although I know what squashfs is, I'm not sure how to unsquash and re-squash, could you point me to a guide?
yes, I want to keep it constantly up-to-date with security patches. Didn't want to run off a VM because if someone has breached my PC, they have access to the VM, correct? What should I do?
Looked into CentOS, I'm not opposed to another OS, especially if it is secure. However, I read that more popular OSes have the fastest security updates. Other OSes seem more anonymity based than security-based (Tails, Whonix).
|
|
|
07-19-2018, 12:55 AM
|
#13
|
LQ Guru
Registered: Jan 2005
Location: USA and Italy
Distribution: Debian testing/sid; OpenSuSE; Fedora; Mint
Posts: 5,524
|
You can't get much more popular than Centos! It's the noncommercial clone of Red Hat! And, like RH, it uses SELinux, which is good.
|
|
|
All times are GMT -5. The time now is 03:45 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|