Fred Krogh wrote:I was thinking primarily of the situation after I'm booting from the hard drive. But perhaps even then there are no services that allow for an attack. The first thing I did after this point was to install shorewall, but there was some sort of problem with the install and that took awhile.
Unless you installed and started up services at boot (via rc-update), there shouldn't be anything listening to a port on the network of your machine. Also, assuming you're running a fairly recent kernel, there should not be any known vulnerabilities to that either...
So for the most part, you won't be exposed to the vast majority of the stuff on the 'net (if you're behind a router that performs NAT, you're protected on yet another layer

).
The only obvious entry point I could see is a corrupt gentoo mirror serving up malicious packages/instructions, but I believe there are (or should be) checks in place for a mirror to be on the list. If this is the case, I suspect someone might notice...that or we're all hosed.
