Re: Different actions on different passwords?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 12/30/2013 08:03 PM, Bill Oliver wrote:
On Tue, 31 Dec 2013, Patrick O'Callaghan wrote:


On Mon, Dec 30, 2013 at 11:25 PM, Bill Oliver <vendor@xxxxxxxxxxxxx> wrote:

In linux, is it possible to dictate two different actions upon login with different passwords?



Short answer: no.

Longer answer: in computing almost anything is possible if you really want to achieve it. Given that on Unix-style systems, including Linux, the login program can be changed, you can modify the source to do what you want. Of course you'll need to have superuser privileges to install it in place of the system standard. Note that doing this may well open a can of worms, e.g. you might have to modify the format of the password file (and hence the library routines that access it), possibly fiddle with SElinux settings, etc. etc.

If the conditions are relaxed slightly you can get a partial solution using the standard login: write a Shell startup script (.profile or whatever) that allows the user to discriminate between the two modes, e.g. by using a timeout, detecting the initial state of the Shift (or Control or whatever) key etc., in a way that is hopefully non-obvious to an observer. Probably not reliable enough for
serious use.

Conclusion: better look for some other way to cover your tracks, and note that a forensic investigation can be carried out without having you log in at all.

poc



Yeah, that's what I thought. I'm a little surprised that there hasn't been a variant of linux developed for areas with intrusive government surveillance. I recently noticed that the government of Venezuela has a government-developed distro (Canaima); think there's some back doors in that? One would think that there would be a movement to provide anti-governmental variants.

I know there's no perfect security. Back in the day, I had an acquaintance whose job was to break into houses and install keyloggers on machines in people's homes. Of course that was back when we still believed in silly things like search warrants.

Sigh. I guess I'll just have to continue keeping my plans for world domination on my brother-in-law's computer... (Just kidding, NSA).

One approach is to put your important stuff on an encrypted partition that is not auto mounted. Mount it only when needed, then unmount it.


--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org




[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux