[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <412E191A.3020901@sdf.lonestar.org>
From: bkfsec at sdf.lonestar.org (Barry Fitzgerald)
Subject: !SPAM! Automated ssh scanning
Ron DuFresne wrote:
>
>If your uasers are not trustable, then they should not have access to
>local systems of yours. Once a person has a shell, then they are 95% to
>root.
>
>
>
I'm not sure I entirely agree with what you're saying.
Scratch that - I'm sure I don't agree with what you're actually saying
here -- though I probably agree with what I think you mean.
If you mean that most default installs have so many packages and that
many of those packages have methods that most people don't know about of
getting around security barriers, then I agree with you.
If you mean that even having a shell on a system means that the person
will eventually get root access, I'm forced to disagree. It depends on
a number of things; including packages installed, their configuration;
the presence of SUID programs; the ability to compile/run code...
Actually locking down a system is not easy, but unlike with MS Windows,
you're not going to break the system by doing it properly. (Read the
filesystem heirarchy standard for some ideas on why that is.)
So, if someone can log into a shell on any *nix system and gain root --
there's still something wrong. It can't just be written off as "well if
you can get shell you can get root, so don't let them get shell"...
that's a cop-out argument and if that's the case, then why are we even
bothering to secure anything anyway?!? The shell is just an interface -
it's security status is only as good as the tools available to it and
it's configuration.
-Barry
p.s. Not trying to ruffle feathers, simply calling it like I see it.
Powered by blists - more mailing lists