Browse Source

Added some new knowledge.

devel
Jonathan Rosenbaum 7 years ago
parent
commit
eff1e61dd4
  1. 14
      examples/secure-terminals.txt

14
examples/secure-terminals.txt

@ -221,7 +221,13 @@ DESKTOP STARTUP
[Desktop Entry]
Type=Application
Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key
Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key"
Where keepass2 is a file in /usr/bin (0755 perms)
#!/bin/sh
# e.g. in this case KeePass.exe was intalled in users home, rather than /usr/lib/keepass2
exec /usr/bin/cli /home/pos/KeePass/KeePass.exe "$@"
2. Gnome based Window manager, e.g. Mate - open gnome-session-properties from commandline,
and add startup application.
@ -301,6 +307,8 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions
set superusers="MyUserName"
password_pbkdf2 MyUserName grub.pbkdf2.sha512.10000.80E702585F80C8D70D4BC75
# if you are using GRUB 2 1.99 the next line needs to be uncommented
# export superusers
4. sudo chmod 0700 40_custom
@ -309,13 +317,13 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions
SSD or HD ENCRYPTION (optional)
If a sign-in computers unencrypted drive goes missing (or is stolen), it should (in most cases)
be pretty obvious, and you would want to change YBDB's htpasswd and root password. However, if you
be pretty obvious, and you would want to change YBDB's htpasswd and root password for the computer. However, if you
want to "help" prevent a detached drive from being accessed, utilitizing an encrypted partition or file container,
for the keepass2 system discussed above, would be one way to go, although, even that can be accessed with a few steps,
and some forensics (https://dfir.science/2014/08/how-to-brute-forcing-password-cracking.html). While most modern
distributions provide an option to encrypt the whole installation, some good reasons for not wanting to do this
include a performance hit, and a more complex recovery. When deciding to go the encryption route, you need to weigh
in the advantages and disadvantages for encrypting while factoring into the equation the nature of environment
in the advantages and disadvantages for encrypting while factoring into the equation the nature of the environment
the computer will be located within.
SUMMARY

Loading…
Cancel
Save