[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Debian 9.1 stable & bios_password



from debian wiki : edit /boot/grub/menu.lst and add the following two lines at the top. This prevents users from editing the boot items. timeout 5 specifies a 5 second delay before grub boots the default item.

timeout         5
color cyan/blue white/blue
password --md5 $1$A9NHZ/$N.6k9riAFMbV/nfsZ2LnD1

does this old (obsolete & unsecure) doc work ?
could it be an alternative creating a menu.lst cheating a bit ?
i like the color line & the simplicity.

Updated how-to :
Set Grub2 boot password on Debian based system (June 9, 2017)
(https://linoxide.com/linux-how-to/set-grub-password)

if i install both ; does it lock, unlock, act as a backdoor, make the system unbootable erasing/removing the boot process ?
and if i install 2 password for the same user , does it work ?

it is just a question about how secure could be a grub password (e.g) if a hack (old how-to) is still allowed ... (i suppose all vulnerabilities are patched yet).


# does a grub2 password secure (unhackable ?) really the o.s ?
# should you recommend it as a safe measure ?

--
Securely sent with Tutanota.
Reply to: