How to disable Ctrl-C during init (initial ramdisk /
normal init)
Michael S. Zick
mszick at morethan.org
Tue May 23 08:54:45 PDT 2006
On Tue May 23 2006 10:46, Rich Felker wrote:
> On Tue, May 23, 2006 at 10:22:53AM -0500, Michael S. Zick wrote:
> > On Tue May 23 2006 10:11, Rich Felker wrote:
> > > On Tue, May 23, 2006 at 08:09:15AM -0500, Michael S. Zick wrote:
> > > > > Or perhaps there is a way to disable stdin on console during critical
> > > > > phase of init?
> > > > >
> > > >
> > > > Keep the customer away from console. Like don't wire it out of the box.
> > >
> > > I disagree with this principle. It's certainly reasonable to have a
> > > kiosk or other type of system where untrusted users can access the
> > > keyboard, and not want them to be able to perform privileged
> > > operations using it!
> > >
> >
> > I was unclear - don't wire out /dev/console.
> >
> > Does not mean you do not bring out other devices for the attachment
> > of keyboards accepting user input.
> >
> > That is: Let init run on /dev/console and allow physical access by
> > users on /dev/something_else.
>
> While there are some additional semantics, /dev/console is the same as
> /dev/tty0 which is in turn the same as the currently selected virtual
> terminal. Unless of course you mean to connect /dev/console to a
> serial device, which depends on actually having a serial device. All
> of this sounds incredibly stupid to me. NO device, whether local,
> remote, connected, unconnected, etc. should unconditionally allow
> random people to interfere with system processes. It's just bad,
> insecure system design.
>
That is exactly what I said. Run the init process on a secure something.
Remove the access by "random people" from the init process. Your choice
of method of implementation.
Thank you for making it clearer than I could word it.
Mike
More information about the busybox
mailing list