Check root password changes done via single user mode

Arthur Chance freebsd at qeng-ho.org
Tue Mar 3 12:55:12 UTC 2015


On 03/03/2015 09:20, Ricardo Martín wrote:
>
> Indeed, that would be a way of checking the password change, but I was
> more interested in whether such a change could be flagged as being
> carried out from single user mode.
> Or in another words whether the root's passwords has been reset
> accessing the machine during the boot process.
>
> On 03/03/15 09:50, Daniel Peyrolon wrote:
>> What I would do is storing a copy of root's password hash somewhere, and
>> compare it with the recent one.
>> The hash can be read at master.passwd (check passwd(5)).
>>
>> El mar., 3 de marzo de 2015 a las 9:02, Ricardo Martín (<
>> fluxwatcher at gmail.com>) escribió:
>>
>>> hi all,
>>>
>>> wondering which would be the best approach to script check if the root
>>> password has been changed via single user mode.

What threat model are you considering? If you're worried about someone 
without normal root access but with access to the console rebooting into 
single user mode and changing the password, mark the console as insecure 
in /etc/ttys, and then the root password will be needed to log in even 
in SUM.

As Bruce Schneier says, there's no such thing as perfect security, it 
all depends on what costs (in money, time, or effort) attacker and 
defender are prepared to pay.

-- 
Those who do not learn from computing history are doomed to
GOTO 1


More information about the freebsd-questions mailing list