Here's  the  thing  though.   I  am  planning a HUGE migration from
   Microsoft  to Linux in a K-12 school system.  This includes servers
   AND  workstations.   Now,  trust  me,  I'm  not fan of Microsoft, I
   downright  despise them.  However, would any kid in the network get
   his  hand  on  a workstation and be able to start changing the root
   password?
Not _any_ kid. He would at least have to know how to boot into single user 
mode, it's not like it's entered automatically or anything.

    What type of security other than with the bootloader is
   there?   Is  there a way to turn off Single User Mode?  If so, what
   are the implications of doing this?
Hmmm. Probably not. However, there are only two ways of entering single 
user mode, as far as I know:
1. Via the bootloader
2. Using the "init" command.

Now, to run init, you will have to be logged in as superuser, i.e. you can 
do it only if you know the root password already, so if you also set a 
bootloader password, you should be pretty safe. At least as far as single 
user mode entry is concerned. As someone else pointed out, it is also 
possible to get unrestricted access to the filesystem by booting from the 
installer CD or another hard drive...

- Toralf



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to