[lug] Read-Only Linux - tips on protecting your system

Neal McBurnett neal at bcn.boulder.co.us
Fri Mar 21 09:17:47 MST 2003


Here's a nice site with instructions on how to configure your system
to be easily restored after root compromise.  Similar in principle to
the many bootable cdroms, but with tips on wiring disk drives to
switches to make it easy to make config changes.

http://www.ultimeth.net/linux/

 Read-Only Linux is a configuration and operational concept, and not a
 product. Read-Only Linux is intended to provide an additional level
 of security against root compromises of a Linux system. While there
 is no substitute for staying informed about the current
 vulnerabilities of, and upgrades for, any computer system, there is
 also no substitute for having a system where virtually all of the
 files are physically protected against being changed by an
 intruder. Even if a system has been root compromised, if it is
 physically impossible to modify most of its files, the system can
 easily be restored to normal operation, often by just rebooting.

 The fundamental concept behind Read-Only Linux is that two different
 media are used in normal operation: one is normal read-write media,
 typically a hard disk, and the other is physically read-only
 media. The read-only media may be a bootable CD-ROM, or a second hard
 disk which has write-protect pins that may be jumpered. Many SCSI
 hard drives come with such a capability, and wiring the jumper pins
 to an external switch probably provides the most flexibility and
 performance. In many enclosures, the wires from the "Key Lock" or
 "Turbo" switches can be simply plugged into the write-protect jumper
 pins on the drive.

 ....

Cheers,

Neal McBurnett                 http://bcn.boulder.co.us/~neal/
GPG/PGP signed and/or sealed mail encouraged.  Keyid: 2C9EBA60



More information about the LUG mailing list