Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Nov 1995 22:17:45 -0700
From:      Nate Williams <nate@rocky.sri.MT.net>
To:        Terry Lambert <terry@lambert.org>
Cc:        nate@rocky.sri.MT.net (Nate Williams), freebsd-current@FreeBSD.org
Subject:   Re: schg flag on make world in -CURRENT
Message-ID:  <199511290517.WAA19065@rocky.sri.MT.net>
In-Reply-To: <199511290210.TAA26584@phaeton.artisoft.com>
References:  <199511282344.QAA18335@rocky.sri.MT.net> <199511290210.TAA26584@phaeton.artisoft.com>

index | next in thread | previous in thread | raw e-mail

Terry Lambert writes:
> > WHAT?!?  Terry, you're losing it.
> > 
> > Do you understand what the 'secure' flag means?  It means that root is
> > allowed to directly login via that tty/pty.  So, if you have folks who
> > need to come in remotely in your scheme, you need to make *ALL* of your
> > connections secure, which opens up a huge can of worms.
> 
> Only if they need to su to root after they come in.  What normal user
> comes in from outside the firewall and su's anyway?

All of the folks who do root work on freefall, and David's work on
wcarchive.

> It's silly to type a root password over an insecure line.  That's the
> point of not allowing it.  Even if the potential cracker types it
> right, he types it wrong.

1) If you are that worried about breakin's, use secure telnet or
something like that.

> > The current behavior is a mix of usefulness plus security.  The cracker
> > needs to break into an account which is in the 'wheel' group, and then
> > they need to crack the root passwd w/out raising suspicions in the
> > logfiles while every failed attempt to 'su' to root is logged to the
> > screen, the logfile, and any user already su'd to root on the box.
> 
> Logfiles go away after your cracker in, as do the console contents.  And
> since you can tell other users su'ed onto the machine (as well as anyone
> else syslog feels free to bitch at) without arousing suspicions.

We might as well give up then, huh?  

> All your cracker has to do is watch the wire traffic to get your root
> password, and use it, if you allow it to be used over the wire in the
> first place.

If you've got a snooper on the wire, you've got big problems, the least
of which is him getting root access.  If that is your concern, use a
more secure method of communication to the remote system (ssh, etc..)

> Setting pty's secure is a silly thing to do in any situation unless, as
> is allowing user's to su from unsecure lines.

You can 'su' on insecure lines.  You can't directly login as root on
insecure lines.


Nate


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199511290517.WAA19065>