When I boot system in to recovery mode from GRUB menu, I can get in to all powerful root without entering any password, thus insecure.
How I can secure this and ensure that a password is asked every time I attempt to access root in recovery mode?
When I boot system in to recovery mode from GRUB menu, I can get in to all powerful root without entering any password, thus insecure.
How I can secure this and ensure that a password is asked every time I attempt to access root in recovery mode?
There is a post on Ubuntu forums about protecting entries by password, basically to make the recovery menuitems require you to login as superman with password 1234 you need to edit some very hairy config/script files:
Add to /etc/grub.d/00_header
Change /etc/grub.d/10_linux
From:
To:
Perfecting protection is profoundly hard
Other things you need to do is to password protect your bios, disable booting from anything else than primary hard drive, and encrypt your root partition and mount any other partition as noexec. This still leaves lots of vectors.
The only reliable way to protect the system from an attacker having physical access to the machine is full-disk encryption.
You can't protect your data if it's not encrypted, but you can protect
root
user. When anyone try to access your disk viarecovery mode
, she/he needs password.set root password
test root access