Results 1 to 9 of 9

Thread: RFE: "bootrofrom= …" (boot read-only from) startup option

  1. #1
    Senior Member registered user
    Join Date
    Dec 2004
    Posts
    168

    RFE: "bootrofrom= …" (boot read-only from) startup option

    there actually is a way to boot from an iso knoppix image which is mounted read-only (ro), namely: using the "forensic" startup option. You would, say, startup with the one liner:
    boot: knoppix64 no3d init 2 forensic bootfrom="/dev/sd"
    then on init 2 you go:
    mount | grep sd
    to get:
    /dev/sd on /mnt-iso type ext4 (ro,relatime,block_validity,delalloc,barrier,user_ xattr,acl)
    The problem with the "forensic" option is that then all other partitions are mounted write-protected, read-only. Or, how do you work around this? There should be a "bootrofrom= ..." option for those of us who want to make sure the knoppix baseline is not being altered and want to be able to easily check if that is the case. On init 2 you could always edit /etc/passwd in order to create and change user directories Since the Internet has become such a promiscuous environment in which "Russian hackers" are constantly messing for fun and profit every connected device, introducing such a startup option would be great. I don’t believe at all in antivirus software It shouldn’t be that hard. Probably just including menuentries in the grub2 loader? What may I be missing? lbrtchx

  2. #2
    Senior Member registered user
    Join Date
    Dec 2004
    Posts
    168
    why do you make so hard properly formatting a message? Why can't poster not enter plain html?

  3. #3
    Senior Member registered user
    Join Date
    Dec 2004
    Posts
    168
    after noticing the corrupted formatting but I can't edit it at all

  4. #4

  5. #5
    I normally use the "forensic" option with a pendrive. But what I do is keeping some files/folders (new versions of tor browser, firefox and libflashplayer.so, checked with the sum when downloaded) zipped and encrypted in some folder inside my Knoppix with gpg (gpg -c --cipher-algo AES256 file.zip). So, I boot with knoppix forensic, write my wifi password and then decrypt those files (gpg file.gpg), remember that home folder is not read-only in that session. Every time I boot all is clean. The problem could be if my home folder (and so, my browsers and files) are hacked/cracked in that session. I avoid scripts (noscript addon) and normally I only use the browser, only some times flashplayer (yes, that΄s dangerous), but if I want I can delete all the decrypted files and encrypt them again in that session. But it΄s great to know that in the next boot (or if I begin the process again in the current session) all is always clean.
    Last edited by joselb; 12-23-2016 at 07:41 AM.

  6. #6
    Senior Member registered user
    Join Date
    Dec 2004
    Posts
    168
    well, yeah I also:

    1) make the image file read-only
    2) make their attributes unmodifiable (lsattr chattr)
    3) resize the file system to its bare minimum (using gpated)

    but a boot ro from an image would be a great option

  7. #7
    I don't understand it very well, even if you boot from an image, using forensic option it will be read only, but it's impossible to use knoppix if ALL is read-only, some parts won't be that way. But the system part will remain read-only and protected in every boot. Maybe I miss something here.

  8. #8
    Senior Member
    Join Date
    Dec 2012
    Posts
    152
    The OP seems to enjoy his trolling.

  9. #9
    Senior Member registered user
    Join Date
    Dec 2004
    Posts
    168
    Quote Originally Posted by philo View Post
    The OP seems to enjoy his trolling.
    http://knoppix.net/forum/faq.php?faq...eading_posting

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  


Cisco WS-C3750X-48PF-S 48 Port PoE Gigabit Switch w/ C3KX-NM-10G & Dual 1100WAC picture

Cisco WS-C3750X-48PF-S 48 Port PoE Gigabit Switch w/ C3KX-NM-10G & Dual 1100WAC

$121.88



Cisco Catalyst WS-C2960X-24PD-L GigE PoE 370W, 2 x 10G SFP+, LAN Base H22 picture

Cisco Catalyst WS-C2960X-24PD-L GigE PoE 370W, 2 x 10G SFP+, LAN Base H22

$94.00



CISCO MERAKI MS120-24P-HW 24-PORT GIGABIT CLOUD MANAGED PoE SWITCH - UNCLAIMED picture

CISCO MERAKI MS120-24P-HW 24-PORT GIGABIT CLOUD MANAGED PoE SWITCH - UNCLAIMED

$103.74



Cisco Nexus 48-Port 10G SFP+ Switch N9K-93128TX w/ 9K-M12PQ 12-Port 40G QSFP picture

Cisco Nexus 48-Port 10G SFP+ Switch N9K-93128TX w/ 9K-M12PQ 12-Port 40G QSFP

$112.49



πŸ”₯πŸ”₯πŸ”₯ CISCO SFP-10G-SR V03 10-2415-03 850nm 10GBASE-SR SFP+ Multi Module πŸ”₯πŸ”₯πŸ”₯ picture

πŸ”₯πŸ”₯πŸ”₯ CISCO SFP-10G-SR V03 10-2415-03 850nm 10GBASE-SR SFP+ Multi Module πŸ”₯πŸ”₯πŸ”₯

$6.80



Cisco Nexus N3K-C3048TP-1GE 48P 1GbE 4P SFP+ Switch N3K-C3048TP-1GE picture

Cisco Nexus N3K-C3048TP-1GE 48P 1GbE 4P SFP+ Switch N3K-C3048TP-1GE

$89.00



Cisco Nexus N3K-C3064PQ-10GX 48P 10GbE SFP+ 4P QSFP+ Switch (Fair) picture

Cisco Nexus N3K-C3064PQ-10GX 48P 10GbE SFP+ 4P QSFP+ Switch (Fair)

$85.00



Cisco C3850-NM-2-10G 2 Port Network Exp.Module for 3850 picture

Cisco C3850-NM-2-10G 2 Port Network Exp.Module for 3850

$30.99



Cisco C9200L-STACK-KIT Stacking Kit New Sealed picture

Cisco C9200L-STACK-KIT Stacking Kit New Sealed

$435.57



Cisco WS-C2960X-48FPD-L 48 V07 POE+ GE+2 10G SFP+, LAN BASE 740W w/ C2960X-Stack picture

Cisco WS-C2960X-48FPD-L 48 V07 POE+ GE+2 10G SFP+, LAN BASE 740W w/ C2960X-Stack

$110.00