Page MenuHomeFreeBSD

D16700.id46691.diff
No OneTemporary

D16700.id46691.diff

Index: head/sbin/init/init.8
===================================================================
--- head/sbin/init/init.8
+++ head/sbin/init/init.8
@@ -31,7 +31,7 @@
.\" @(#)init.8 8.3 (Berkeley) 4/18/94
.\" $FreeBSD$
.\"
-.Dd August 14, 2018
+.Dd August 15, 2018
.Dt INIT 8
.Os
.Sh NAME
@@ -86,6 +86,15 @@
.Em console
is marked as
.Dq secure .
+Note that the password check does not protect from variables
+such as
+.Va init_script
+being set from the
+.Xr loader 8
+command line; see the
+.Sx SECURITY
+section of
+.Xr loader 8 .
.Pp
If the system security level (see
.Xr security 7 )
Index: head/stand/man/loader.8
===================================================================
--- head/stand/man/loader.8
+++ head/stand/man/loader.8
@@ -24,7 +24,7 @@
.\"
.\" $FreeBSD$
.\"
-.Dd August 14, 2018
+.Dd August 15, 2018
.Dt LOADER 8
.Os
.Sh NAME
@@ -945,6 +945,42 @@
.Nm
version.
.El
+.Sh SECURITY
+Access to the
+.Nm
+command line provides several ways of compromising system security,
+including, but not limited to:
+.Pp
+.Bl -bullet -compact
+.It
+Booting from removable storage, by setting the
+.Va currdev
+or
+.Va loaddev
+variables
+.It
+Executing binary of choice, by setting the
+.Va init_path
+or
+.Va init_script
+variables
+.It
+Overriding ACPI DSDT to inject arbitrary code into the ACPI subsystem
+.El
+.Pp
+One can prevent unauthorized access
+to the
+.Nm
+command line by setting the
+.Va password ,
+or setting
+.Va autoboot_delay
+to -1.
+See
+.Xr loader.conf 5
+for details.
+In order for this to be effective, one should also configure the firmware
+(BIOS or UEFI) to prevent booting from unauthorized devices.
.Sh FILES
.Bl -tag -width /usr/share/examples/bootforth/ -compact
.It Pa /boot/loader

File Metadata

Mime Type
text/plain
Expires
Sun, Feb 8, 9:38 PM (10 h, 6 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
28501018
Default Alt Text
D16700.id46691.diff (1 KB)

Event Timeline