home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!uakari.primate.wisc.edu!tik.vtt.fi!tml
- From: tml@tik.vtt.fi (Tor Lillqvist)
- Newsgroups: comp.sys.hp
- Subject: Re: HP 9000/370, no root password!
- Message-ID: <TML.92Aug23012732@hemuli.tik.vtt.fi>
- Date: 23 Aug 92 01:27:32 GMT
- References: <1992Aug15.022529.7176@mccc.edu> <67870148@hpcupt1.cup.hp.com>
- <TT.92Aug22194838@tarzan.jyu.fi>
- Sender: news@tik.vtt.fi (USENET)
- Organization: Technical Research Centre of Finland, Laboratory for Information
- Processing (VTT/TIK)
- Lines: 12
- In-Reply-To: tt@tarzan.jyu.fi's message of Sat, 22 Aug 1992 17:48:38 GMT
-
- In article <TT.92Aug22194838@tarzan.jyu.fi> tt@tarzan.jyu.fi (Tapani Tarvainen) writes:
- One question about this thread: Does physical access to a
- _diskless_ workstation form any serious security risk?
- Besides the danger of someone carrying the thing away, that is. :-)
-
- Well, you can fake the diskless protocol, pretend to be booting, and
- start accessing file systems. Of course, this is possible anyway if
- you know the hardware address of one diskless machine that happens to
- be down, and have access to the cable.
- --
- Tor Lillqvist,
- working, but not speaking, for the Technical Research Centre of Finland
-