[Bug 1497909] Re: grub's root terminal in the recovery menu, makes it possible for physical hacking.

Josef Schneider ubuntu at netpage.dk
Mon Sep 21 09:39:17 UTC 2015


*** This bug is a duplicate of bug 283662 ***
    https://bugs.launchpad.net/bugs/283662

** This bug has been marked a duplicate of bug 283662
   no login promt at "recovery mode"-boot

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to grub in Ubuntu.
https://bugs.launchpad.net/bugs/1497909

Title:
  grub's root terminal in the recovery menu, makes it possible for
  physical hacking.

Status in grub package in Ubuntu:
  New

Bug description:
  TL;DR
  When my laptops is stolen, people can choose the recovery option from grub startup menu, select the root terminal and 
  createa a privileged user.

  FIX:

  My proposed fix: When choosing the root terminal ask for the local
  password for the local root privileged account.

  If someone tries to create another account to 'steal' data? One still
  needs a password

  Long story

  http://askubuntu.com/q/676545/36315

  I messed up my Ubuntu, I only got a black when booting my Ubuntu. When
  I started up my laptop, I selected the recovery option from the grub
  menu, and choose fallback at root terminal. I saw that I was able to
  use the add user command, which I probably could turn into a
  privileged user on my machine.

  Isn't that a security issue?

  One could have stolen my laptop, and at startup chose recovery and add
  another user, I'm fudged then. Including my data.

  Come to think of it, even if you somehow remove that entry, one could
  boot from a live-CD, get a chroot up and running, and then add another
  user, with the right privileges that allows it to muck everything up.

  If I set the BIOS to boot at my HD only, no USB, CD/DVD, Network
  startup. And set a BIOS password, it still wouldn't matter. Because
  you'd still have that grub recovery startup entry.

  I am fairly certain that someone from China, Russia can't just hack my
  Ubuntu Trusty Tahr, because it's secure like that. But, if one has
  physical access to my - your - machine, then, well, that's why I'm
  asking this question. How can I secure my machine so that hacking
  through physical access is not possible?

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: grub (not installed)
  ProcVersionSignature: Ubuntu 3.19.0-28.30~14.04.1-generic 3.19.8-ckt5
  Uname: Linux 3.19.0-28-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.13
  Architecture: amd64
  CurrentDesktop: Unity
  Date: Mon Sep 21 11:02:01 2015
  InstallationDate: Installed on 2015-09-09 (12 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  SourcePackage: grub
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub/+bug/1497909/+subscriptions



More information about the foundations-bugs mailing list