Previous Next Contents

3. Physical Security

The first "layer" of security you need to take into account is the physical security of your computer systems. Who has direct physical access to your machine? Should they? Can you protect your machine from their tampering? Should you?

How much physical security you need on your system is very dependent on your situation, and/or budget.

If you are a home user, you probably don't need a lot (although you might need to protect your machine from tampering by children or annoying relatives). If you are in a Lab environment, you need considerably more, but users will still need to be able to get work done on the machines. Many of the following sections will help out. If you are in a Office, you may or may not need to secure your machine off hours or while you are away. At some companies, leaving your console unsecured is a termination offense.

Obvious physical security methods such as locks on doors, cables, locked cabinets, and video survailance are all a good idea, but beyond the scope of this document. :)

3.1 Computer locks

Many more modern pc cases include a "locking" feature. Usually this will be a socket on the front of the case that allows you to turn an included key to a locked or unlocked position. Case locks can help prevent someone from stealing your pc, or opening up the case and directly manipulating/stealing your hardware. They can also sometimes prevent someone from rebooting your computer on their own floppy or other hardware.

These case locks do different things according to the support in the motherboard and how the case is constructed. On many pc's they make it so you have to break the case to get the case open. On some others they make it so that it will not let you plug in new keyboards and mice. Check your motherboard or case instructions for more information. This can sometimes be a very useful feature, even though the locks are usually very low quality and can easily be defeated by attackers with locksmithing.

Some cases (most notably sparcs and macs) have a dongle on the back that if you put a cable through attackers would have to cut the cable or break the case to get into it. Just putting a padlock or combo lock through these can be a good deterrent to someone stealing your machine.

3.2 BIOS Security

The BIOS is the lowest level of software that configures or manipulates your x86 based hardware. LILO and other linux boot methods access the BIOS to determine how to boot up your linux machine. Other hardware that linux runs on has similar software (OpenFirmware on macs and new suns, sun boot prom, etc...). You can use your BIOS to prevent attackers from rebooting your machine and manipulating your linux system.

Under linux/x86 many pc bioses let you set a boot password. This doesn't provide all that much security (bios can be reset, or removed if someone can get into the case), but might be a good deterant (ie it will take time and leave traces of tampering).

Many x86 bioses also allow you to specify various other good security settings. Check your bios manual or look at it the next time you boot up. Some examples are: disallow booting from floppy drives and passwords to access some bios features.

On Linux/Sparc, your SPARC eeprom can be set to require a boot-up password. This might slow attackers down.

NOTE: If you have a server machine, and you setup a boot password, your machine will not boot up unattended. Keep in mind that you will need to come in and supply the password in the even of a power failure. ;(

3.3 Boot loader Security

The various linux boot loaders also can have a boot password set. Using lilo take a look at the "restricted" and "password" settings. "password" allows you to set a bootup password. "restricted" will let the machine boot _unless_ someone specifies options at the lilo: prompt (like 'single').

Keep in mind when setting all these passwords that you need to remember them. :) Also remember that these passwords will mearly slow the determined attacker.

If anyone has security related information from a different boot loader, I would love to hear it. (grub, silo, milo, linload, etc).

NOTE: If you have a server machine, and you setup a boot password, your machine will not boot up unattended. Keep in mind that you will need to come in and supply the password in the even of a power failure. ;(

3.4 xlock and vlock

If you wander away from your machine from time to time, it is nice to be able to "lock" your console so that no one tampers with or looks at your work. Two programs that do this are: xlock and vlock.

Xlock is a X display locker. It should be included in any linux distributions that support X. Check out the man page for it for more options, but in general you can run xlock from any xterm on your console and it will lock the display and require your password to unlock.

vlock is a simple little program that allows you to lock some or all of the virtual consoles on your linux box. You can lock just the one you are working in or all of them. If you just lock one, others can come in and use the console, they will just not be able to use your vty until you unlock it. vlock ships with redhat linux, but your mileage may vary.

Of course locking your console will prevent someone from tampering with your work, but does not prevent them from rebooting your machine or otherwise disrupting your work.

3.5 Detecting Physical Security compromises.

The first thing to always note is when your machine was rebooted. Since linux is a robust and stable OS, the only times your machine should reboot is when YOU take it down for OS upgrades, hardware swapping, or the like. If your machine has rebooted without you doing it, a trouble light should go on. Many of the ways that your machine can be compromised require the intruder to reboot or power off your machine.

Check for signs of tampering on the case and computer area. Although many intruders clean traces of their presence out of logs, it's a good idea to check through them all and note any discrepancy.

Some things to check for in your logs:

Where to look for your log file will depend on your distribution. In the standard redhat setup, you will want to look in /var/log/ and check messages, mail.log, and others.

You might also want to configure your log-rotating script or daemon to keep logs around longer so you have time to examine them. Take a look at the 'logrotate' package un recent redhat distributions. Other distributions likely have a similar process.

Previous Next Contents