From owner-freebsd-questions@FreeBSD.ORG Sun Mar 11 14:09:57 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 26C9D16A40F for ; Sun, 11 Mar 2007 14:09:57 +0000 (UTC) (envelope-from lenzi@k1.com.br) Received: from sipserver.k1.com.br (customer-200195195217.idc.onda.com.br [200.195.195.217]) by mx1.freebsd.org (Postfix) with ESMTP id 5010E13C44C for ; Sun, 11 Mar 2007 14:09:55 +0000 (UTC) (envelope-from lenzi@k1.com.br) Received: from k1.com.br (localhost [127.0.0.1]) by sipserver.k1.com.br (8.13.6/8.13.6) with ESMTP id l2BCR9N3026729 for ; Sun, 11 Mar 2007 11:09:54 -0300 (BRT) (envelope-from lenzi@k1.com.br) X-MessageWall-Score: 0 (k1.com.br) Received: from [201.21.172.89] (authenticated as lenzi) by k1.com.br (MessageWall 1.0.8) with SMTP; 11 Mar 2007 14:09:53 -0000 From: Sergio Lenzi To: freebsd-questions@freebsd.org In-Reply-To: <20070311110809.O84473@chylonia.3miasto.net> References: <20070310224946.K10353@chylonia.3miasto.net> <200703101338.22384.beech@alaskaparadise.com> <20070311081332.G66000@chylonia.3miasto.net> <14989d6e0703110143i53b3d0bfh65d0e4092993e82e@mail.gmail.com> <20070311110809.O84473@chylonia.3miasto.net> Date: Sun, 11 Mar 2007 11:09:52 -0300 Message-Id: <1173622192.1208.21.camel@localhost> Mime-Version: 1.0 X-Mailer: Evolution 2.8.3 FreeBSD GNOME Team Port Content-Type: text/plain Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Subject: Re: root login with telnetd X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Mar 2007 14:09:57 -0000 Hello... I see you issues about telenet... I use the inetd+telnet for more than 20 years and using BSD with RSA, and obviiously with a good password. I have never been cracked down... and I have 10 of my /etc/ttys entries setted to "secure" ttyp0 none network off secure ttyp1 none network off secure ttyp2 none network off secure ttyp3 none network off secure ttyp4 none network off secure ttyp5 none network off secure ttyp6 none network off secure ttyp7 none network off secure ttyp8 none network off secure ttyp9 none network off secure ttypa none network off secure ttypb none network off secure ttypc none network off secure in my /etc/master.passwd..... root:*:0:0::0:0:Charlie &:/root:/bin/csh a "kill -1 1" would allow root do dial in I block the root account in /etc/master.passwd by put a "*" as md5hash and setted up an "supper" account..... pw adduser xxxxxxxxx -d /root -s /usr/local/bin/bash -u 0 -g 0 -h 0 Than is done... All the cracking I have seen is from someone that is INSIDE the machine (http using php,pop,imap, ssh,...) that is you have yet allowed him to come in, you gave them the password (in the case of ssh), or in http... A "normal" FreeBSD 6.2 or an OpenBSD, is incredible solid... You must know the "superuser" login AND the password.... choose a password with letters and numbers, or something in portuguese (only 7 countries speak that): biruta22, pezinho12, 45pinheiiros, tovazioagora, batatinha744, 45canastra96..... I tested in an security system and it says is have good security... (pgp)... Besides.. using brute force in a word like "itacolomi" using a 1 second delay would result ,,,, "forever" Besides, BSD have the ability to force a new password once it is too old... a new password every 3 months is a good choice.... and you must stilll pass through RSA . Thanks for sharing the experience... now I know I am not the one that uses "telenet"