Re: How to get away with small /var partition
On 2003-11-30, Karsten M. Self <kmself@ix.netcom.com> wrote:
>> I recommend making it far larger than in the Debian security doc
>> though. On my servers I have /boot and /usr read-only, and I've been
>
> You can leave /boot unmounted altogether. The only times it needs to be
> accessed are:
>
> - At boot time, where access is direct to partition, and the partition
> need not be mounted (indeed, can't be).
>
> - When examining kernel config files and System maps (read-only)
>
> - When installing a new kernel (writeable)
Show me a good reason to separete /boot to a separate partition at
all. What's the extra security we get out of this?
In /boot there are only the kernel images. System.map's, kernel
config, and GRUB config.
All that is writable only by root anyway (perms -rw-r--r-- root.root)
If an attacker get's rights to write or change perms of files there,
he can equally easy remount the partition rw.
So what's the point?
--
Miernik ________________________ jabber:miernik@amessage.info
___________________/__ tel: +48608233394 __/ mailto:miernik@ctnet.pl
Support impeaching the war criminalist George W. Bush
http://www.votetoimpeach.org/
Reply to: