From: gtoal@an-teallach.com (Graham Toal)
To: cypherpunks@toad.com
Message Hash: 02a77a9e687b843db59ef50c839fde0b70e8a63e3fce2a96072e087b0d21f701
Message ID: <7322@an-teallach.com>
Reply To: N/A
UTC Datetime: 1993-11-12 12:49:31 UTC
Raw Date: Fri, 12 Nov 93 04:49:31 PST
From: gtoal@an-teallach.com (Graham Toal)
Date: Fri, 12 Nov 93 04:49:31 PST
To: cypherpunks@toad.com
Subject: Mounting a "Secure" filesystem in UNIX
Message-ID: <7322@an-teallach.com>
MIME-Version: 1.0
Content-Type: text/plain
In article <m0oxo8a-000J5iC@infinity.hip.berkeley.edu> sameer@uclink.berkeley.edu writes:
> I was wondering if it was possible to mount a "secure"
> filesystem/partition using Linux or some other free version of UNIX,
> so that it's inaccessible if logged in remotely, but accessibly when
> logged in locally.
> That way I can store my PGP secret key on the "secure"
> filesystem, and keep telnetd enabled.
>
> Any thoughts?
I think the best you can do is to create a secure chroot subshell which
anyone logging in anywhere but from the console gets put into.
[When I wrote such a shell as an experiment, I found it very difficult
to do properly when the system had multiple partitions - I could only
get it to work on a machine that had a single pack. So if you're starting
from scratch, my suggestion is to use netbsd and start off with your
entire disk on a single partition - don't have the traditional small
root partition. If you get that far I have some code I can mail you.]
G
--
Personal mail to gtoal@gtoal.com (I read it in the evenings)
Business mail to gtoal@an-teallach.com (Be careful with the spelling!)
Faxes to An Teallach Limited: +44 31 662 4678 Voice: +44 31 668 1550 x212
Return to November 1993
Return to “gtoal@an-teallach.com (Graham Toal)”
1993-11-12 (Fri, 12 Nov 93 04:49:31 PST) - Mounting a “Secure” filesystem in UNIX - gtoal@an-teallach.com (Graham Toal)