LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-02-2009, 10:07 AM   #1
john83reuben
Member
 
Registered: Oct 2007
Location: Kuala Lumpur,Malaysia
Distribution: Debian Etch, OpenSuse
Posts: 132

Rep: Reputation: 17
Question about Lost root password


Hi, I have a question about lost root password.

Have a look at this website

http://www.linuxclues.com/articles/11.htm

Based on the website, it says we can change a root password if we forget the password.

So that means, i can simply use anyone's LInux box (when he is not around) and use KNopix live CD and change the root password.


So cracking into a linux box is possible (considering we must be physically there to change it) . Am I correct.


Linux security experts, what are your thoughts about this issue??

Last edited by john83reuben; 02-02-2009 at 10:08 AM.
 
Old 02-02-2009, 10:53 AM   #2
tredegar
LQ 5k Club
 
Registered: May 2003
Location: London, UK
Distribution: Fedora38
Posts: 6,147

Rep: Reputation: 435Reputation: 435Reputation: 435Reputation: 435Reputation: 435
You are correct.

You need to have physical control over who can access your computer before it can be considered "secure".
That's why commercial data centres are always housed in secure buildings.

Once you have physically secured your computer, you then need to consider software security.
 
Old 02-02-2009, 10:58 AM   #3
repo
LQ 5k Club
 
Registered: May 2001
Location: Belgium
Distribution: Arch
Posts: 8,529

Rep: Reputation: 899Reputation: 899Reputation: 899Reputation: 899Reputation: 899Reputation: 899Reputation: 899
Quote:
So cracking into a linux box is possible (considering we must be physically there to change it) . Am I correct.
unless you password protect the BIOS, so you can't boot from CD
 
Old 02-02-2009, 11:01 AM   #4
tredegar
LQ 5k Club
 
Registered: May 2003
Location: London, UK
Distribution: Fedora38
Posts: 6,147

Rep: Reputation: 435Reputation: 435Reputation: 435Reputation: 435Reputation: 435
But I can reset your BIOS, or just remove your HDD and mount it in my system, if I have physical access to your hardware
 
Old 02-02-2009, 11:35 AM   #5
slimm609
Member
 
Registered: May 2007
Location: Chas, SC
Distribution: slackware, gentoo, fedora, LFS, sidewinder G2, solaris, FreeBSD, RHEL, SUSE, Backtrack
Posts: 430

Rep: Reputation: 67
Quote:
Originally Posted by tredegar View Post
But I can reset your BIOS, or just remove your HDD and mount it in my system, if I have physical access to your hardware
The only way around this is to use something like truecrypt and encrypt the entire drive.

If you use a stong password and a strong algorithm then there is no getting around that.(at least by current day computers)
 
Old 02-02-2009, 11:42 AM   #6
r3sistance
Senior Member
 
Registered: Mar 2004
Location: UK
Distribution: CentOS 6/7
Posts: 1,375

Rep: Reputation: 217Reputation: 217Reputation: 217
Quote:
Originally Posted by tredegar View Post
But I can reset your BIOS
That isn't always actually true, some servers have non-violiate BIOS's which are not resetable per se, generally for PCs it's true. My own PC has three specialised requirements for resetting a bios that either require the manual or alot of research to find out, it's not as easy as most generalised motherboards.

However the same could also be said for windows too, it's a bit more complicated but can be done. You take out the Hard Drive, place it into another windows PC and delete the password file, move the hard drive back and you know the adminstrator password is blank... their are applications out their that perform this operation automatically by burning them to CD and booting to the CD...

Physical access is a dangerous thing.
 
Old 02-02-2009, 11:59 AM   #7
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by slimm609 View Post
The only way around this is to use something like truecrypt and encrypt the entire drive.

If you use a stong password and a strong algorithm then there is no getting around that.(at least by current day computers)
Even with a totally encrypted drive (assuming you are booting from a USB key, for example), you are still vulnerable in certain ways if the attacker has physical access. For example, he could clone your encrypted drive while you are away, and then install a hardware sniffer to pick up the key the next time you provide it (which he will then use to decrypt the clone he already has). Another possibility is launching a cold boot attack. The point being, there's tons of ways a determined attacker can get his hands on your data even if you are using whole-disk encryption. Of course, I'm not saying that encryption doesn't provide a lot of benefits - it does. It's just that "there is no getting around that" is pretty far fetched.

Last edited by win32sux; 02-02-2009 at 12:02 PM.
 
Old 02-02-2009, 12:16 PM   #8
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by john83reuben View Post
Hi, I have a question about lost root password.

Have a look at this website

http://www.linuxclues.com/articles/11.htm

Based on the website, it says we can change a root password if we forget the password.

So that means, i can simply use anyone's LInux box (when he is not around) and use KNopix live CD and change the root password.


So cracking into a linux box is possible (considering we must be physically there to change it) . Am I correct.


Linux security experts, what are your thoughts about this issue??
Yes, this is the way it is for any operating system. That said, in reality I would expect the attacker to NOT change the root password. This being due to the fact that doing so would make it evident to the admin that the box has possibly been rooted as soon as he tries to login. So unless the attack is intended to be nothing more than a prank (and he doesn't care about being discovered), the attacker with root access to the filesystem will likely want to do much more nefarious and/or profitable things - such as installing a rootkit, for example.
 
Old 02-02-2009, 08:24 PM   #9
slimm609
Member
 
Registered: May 2007
Location: Chas, SC
Distribution: slackware, gentoo, fedora, LFS, sidewinder G2, solaris, FreeBSD, RHEL, SUSE, Backtrack
Posts: 430

Rep: Reputation: 67
Quote:
Originally Posted by win32sux View Post
Even with a totally encrypted drive (assuming you are booting from a USB key, for example), you are still vulnerable in certain ways if the attacker has physical access. For example, he could clone your encrypted drive while you are away, and then install a hardware sniffer to pick up the key the next time you provide it (which he will then use to decrypt the clone he already has). Another possibility is launching a cold boot attack. The point being, there's tons of ways a determined attacker can get his hands on your data even if you are using whole-disk encryption. Of course, I'm not saying that encryption doesn't provide a lot of benefits - it does. It's just that "there is no getting around that" is pretty far fetched.

There are ways around that also. like having a 100mb partition outside of the encrypted with something like perl installed. and on shutdown use kexec to boot to the 100mb partition with perl and run a script like i posted in
http://www.linuxquestions.org/questi...ml#post3243756

run the script in a loop 5-10 times and then shutdown.
on 12gb of ram is takes about 3 seconds with fill all the ram.

doing that after you used kexec to boot a partition that is outside of the encrypted drive and ensure the encrypted drive is unmounted and loop the script to clear keys in the ram then shutdown the server

that would clear any cold-boot attacks.

Unless they had access to the machine while it was running then the could unplug it and get the keys from the ram at that point.

You can actually freeze the ram and get the information from the ram up to 48 hours later with liquid nitrogen.

But this is assuming that they have physical access. At that point i would be worried about more than my computer. Like WTF is someone doing in my house.

If it a laptop and they steal it, it would be most likely 1 of 2 things.
either someone beat you up and took it while you were using it or the stole it when you were away from it, ex. broke into car (which it prob should have been powered off for a while and the ram is prob. clear

unless you are protecting TS info (in which case would not be connected to the internet, but a completely different seperate network) you machine is much eaiser to get to from the net then physically 9 times out of 10.

What most people need to focus on is OS security and App security before you worry about physical security.


Win32sux whats up with your tag.
"There are no answers, only choices." -- Solaris

Solaris is not choice.
j/k =)

Last edited by slimm609; 02-02-2009 at 08:26 PM.
 
Old 02-03-2009, 05:55 AM   #10
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by slimm609 View Post
There are ways around that also. like having a 100mb partition outside of the encrypted with something like perl installed. and on shutdown use kexec to boot to the 100mb partition with perl and run a script like i posted in
http://www.linuxquestions.org/questi...ml#post3243756

run the script in a loop 5-10 times and then shutdown.
on 12gb of ram is takes about 3 seconds with fill all the ram.

doing that after you used kexec to boot a partition that is outside of the encrypted drive and ensure the encrypted drive is unmounted and loop the script to clear keys in the ram then shutdown the server

that would clear any cold-boot attacks.

Unless they had access to the machine while it was running then the could unplug it and get the keys from the ram at that point.

You can actually freeze the ram and get the information from the ram up to 48 hours later with liquid nitrogen.

But this is assuming that they have physical access.
Exactly. With physical access, even a "clear memory on shutdown" technique can be bypassed by, well, not letting the victim shut down. Besides, cold boot attacks are just one of many different ways someone could get the key from you.

Quote:
Win32sux whats up with your tag.
"There are no answers, only choices." -- Solaris

Solaris is not choice.
j/k =)
Correct. That's just something which Solaris (the enigmatic ocean world, not the OS) would say.

Last edited by win32sux; 02-03-2009 at 05:56 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
lost password root Coimbra Linux - Newbie 16 08-29-2007 08:53 AM
I have lost my root password. admiralpaul Linux - Security 5 07-13-2007 01:10 AM
i lost my root password!!! raga4223688 Linux - Software 2 02-25-2007 01:32 AM
Root Password Lost ! gurmeet.bedi Linux - Security 1 10-17-2006 07:01 AM
Lost root password amirdhagopal SUSE / openSUSE 13 02-10-2005 12:09 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:45 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration