Re: Linux login security approaches

Raul Miller (rdm@test.legislate.com)
Wed, 9 Dec 1998 12:56:27 -0500


Albert D. Cahalan <acahalan@cs.uml.edu> wrote:
> It is called "Trusted Path", part of B1-level security.

Note that B1 security doesn't even begin to address many significant
network security issues.

> You don't gain root. (if you did, who cares anymore?) This is about
> normal users writing fake logins that might get root's password.

If someone gains root (or even runs a non-framebuffer X server), that
violates any sort of "Trusted Path" assumption that would be inherent
in SAK.

However, there already is an SAK implemented on every pc in existence:
the power switch.

http://cuiwww.unige.ch/info/pc/remote-boot/

[This does make some assumptions about the sort of circumstance where
you'd have multiple users and need a secure attention key. But those
assumption seem right for most cases I can imagine.]

-- 
Raul

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/