1 |
"Walter Dnes" <waltdnes@××××××××.org> writes: |
2 |
|
3 |
> On Sun, Mar 29, 2015 at 12:43:12PM +0200, lee wrote |
4 |
> |
5 |
>> That leaves the question why a user who isn't even logged in should |
6 |
>> be able to reboot, which IIRC they can by default with Ctrl+Alt+Del. |
7 |
>> Such users shouldn't be allowed to do anything but to log in. |
8 |
> |
9 |
> As the old saying goes... "If you don't have physical security, you |
10 |
> don't have any security". A malicious person at the physical keyboard |
11 |
> of the machine could just as easily yank the power cord of out of the |
12 |
> wall, insert a USB key into the machine, plug the machine back in, boot |
13 |
> up from the USB key, and copy over malicious binaries. |
14 |
|
15 |
It's not logical to provide ppl who want to copy over malicious binaries |
16 |
with an easy way to reboot the machine in order to do so. |
17 |
|
18 |
|
19 |
-- |
20 |
Again we must be afraid of speaking of daemons for fear that daemons |
21 |
might swallow us. Finally, this fear has become reasonable. |