home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.sgi
- Path: sparky!uunet!cs.utexas.edu!torn!watserv1!watmath!rblander
- From: rblander@math.waterloo.edu (Robyn Landers)
- Subject: indigo security
- Message-ID: <1992Jul23.171949.5812@math.waterloo.edu>
- Organization: University of Waterloo
- Date: Thu, 23 Jul 1992 17:19:49 GMT
- Lines: 28
-
-
- A teaching lab here at the University of Waterloo has just
- purchased four Iris Indigos. Our hardware people tell us
- that the video cable has to be kept pretty short (unlike the
- video cable on say our 4D/340 with BNC connectors which we
- have extended to a hundred feet or so).
- This means that the Indigos have to be in the same room
- as the monitors, leaving them vulnerable to malicious students.
-
- It appears to me that it is pretty easy to break in as root:
- 1) turn the power off and on
- (steps 2,3,4 omitted, but trust me they're obvious and easy)
- 5) presto, it boots single user and you're root.
-
- I've sifted through the IRIX Site Admin's Guide on Security and
- PROM monitor and have seen no way to password-protect the PROM
- monitor, enforce direct uninterruptable boot to multiuser using initstate,
- (unless shut down nicely), or otherwise prevent such a break-in.
- I also haven't seen anything like Sun's "secure" option in
- /etc/ttytab to require root's password when booting single user.
-
- I really hope I've missed something.
- Can anybody tell me what it is? Thanks.
-
-
- Robyn Landers
- rblanders@math.uwaterloo.ca
- University of Waterloo, Math Faculty Computing Facility
-