Page MenuHomeFreeBSD

D16700.id46657.diff
No OneTemporary

D16700.id46657.diff

Index: sbin/init/init.8
===================================================================
--- sbin/init/init.8
+++ sbin/init/init.8
@@ -86,6 +86,15 @@
.Em console
is marked as
.Dq secure .
+Note that the password check does not protect from variables
+such as
+.Va init_script
+being set from the
+.Xr loader 8
+command line; see the
+.Sx SECURITY
+section of
+.Xr loader 8 .
.Pp
If the system security level (see
.Xr security 7 )
Index: stand/man/loader.8
===================================================================
--- stand/man/loader.8
+++ stand/man/loader.8
@@ -945,6 +945,42 @@
.Nm
version.
.El
+.Sh SECURITY
+Access to the
+.Nm
+command line provides several ways of compromising system security,
+including, but not limited to:
+.Pp
+.Bl -bullet -compact
+.It
+Booting from removable storage, by setting the
+.Va currdev
+or
+.Va loaddev
+variables
+.It
+Executing binary of choice, by setting the
+.Va init_path
+or
+.Va init_script
+variables
+.It
+Overriding ACPI DSDT to inject arbitrary code into the ACPI subsystem
+.El
+.Pp
+One can prevent unauthorized access
+to the
+.Nm
+command line by setting the
+.Va password ,
+or setting
+.Va autoboot_delay
+to -1.
+See
+.Xr loader.conf 5
+for details.
+In order for this to be effective, one should also configure the firmware
+(BIOS or UEFI) to prevent booting from unauthorized devices.
.Sh FILES
.Bl -tag -width /usr/share/examples/bootforth/ -compact
.It Pa /boot/loader

File Metadata

Mime Type
text/plain
Expires
Mon, Feb 9, 1:41 PM (9 h, 12 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
28585408
Default Alt Text
D16700.id46657.diff (1 KB)

Event Timeline