Date: Tue, 03 Mar 2015 12:55:01 +0000 From: Arthur Chance <freebsd@qeng-ho.org> To: fluxwatcher@gmail.com, freebsd-questions@freebsd.org Subject: Re: Check root password changes done via single user mode Message-ID: <54F5AF25.7000303@qeng-ho.org> In-Reply-To: <54F57CD9.2000707@gmail.com> References: <54F56A83.3000404@gmail.com> <CA%2ByaQw_3JJ2tJm32or-UmSpfMFo_jCn_JD1xFw=1E9i9K2reDg@mail.gmail.com> <54F57CD9.2000707@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 03/03/2015 09:20, Ricardo Martín wrote: > > Indeed, that would be a way of checking the password change, but I was > more interested in whether such a change could be flagged as being > carried out from single user mode. > Or in another words whether the root's passwords has been reset > accessing the machine during the boot process. > > On 03/03/15 09:50, Daniel Peyrolon wrote: >> What I would do is storing a copy of root's password hash somewhere, and >> compare it with the recent one. >> The hash can be read at master.passwd (check passwd(5)). >> >> El mar., 3 de marzo de 2015 a las 9:02, Ricardo Martín (< >> fluxwatcher@gmail.com>) escribió: >> >>> hi all, >>> >>> wondering which would be the best approach to script check if the root >>> password has been changed via single user mode. What threat model are you considering? If you're worried about someone without normal root access but with access to the console rebooting into single user mode and changing the password, mark the console as insecure in /etc/ttys, and then the root password will be needed to log in even in SUM. As Bruce Schneier says, there's no such thing as perfect security, it all depends on what costs (in money, time, or effort) attacker and defender are prepared to pay. -- Those who do not learn from computing history are doomed to GOTO 1
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54F5AF25.7000303>