Putting your TINI on the Internet means that anybody can try to login to it. This page provides steps that you can take to make your TINI less susceptible to hacking. You can use TEd to edit files on TINI.
useradd -n <username> -p <password>
-i 128
userdel guest
/etc/passwd
file and change the line for root
from
root:b9f0b678328e5f506c0290ca3b4edba1943462d9:128
to
root:*:0
This will create an inactive root
account with non-superuser privileges that
cannot be used to login.
/etc/.startup
file (if they are present). You will have
to reboot for this to take effect. As counter-intuitive
as this seems, it avoids a bug in the TINI
OS Beta 2.2. FTP server which can leave your
TINI wide open. Fortunately(?), anonymous
FTP does not seem to work in TINI OS Beta
2.2 and root
logins are impossible due to the lack of
an encrypted password in root
's passwd entry.
######## #Autogen'd slush startup file setenv FTPServer active setenv TelnetServer active setenv SerialServer active ## #Add user calls to setenv here: setenv FTP_ALLOW_ANON false setenv FTP_ALLOW_ROOT false ## initializeNetwork ######## #Add other user additions here:
If you know of any other additional hardening techniques for TINI, please send them to TINI_Hardening@smartsc.com.