Date: Tue, 29 May 2001 16:38:44 -0700 (PDT) From: Matt Dillon <dillon@earth.backplane.com> To: Robert Withrow <witr@rwwa.com> Cc: Seth <seth@psychotic.aberrant.org>, Vivek Khera <khera@kcilink.com>, stable@FreeBSD.ORG Subject: Re: adding "noschg" to ssh and friends Message-ID: <200105292338.f4TNciU32058@earth.backplane.com> References: <200105292324.TAA73334@ns1.rwwa.com>
next in thread | previous in thread | raw e-mail | index | archive | help
: : :dillon@earth.backplane.com said: ::- Putting on my security hat... no. All you are doing is forcing ::- the hacker to use some more obscure and possibly less detectable way ::- to compromise the machine. So, in fact, you could be making the ::- problem *worse*. : :Maybe your security hat needs cleaning? The whole game is played by raising :the cost of hacking. Using your theory, we should eliminate all passwords. :*Then* we'd be pretty sure no hacker would trouble himself by using any :obscure hacking methods. (Of course, that would be like windows, wouldn't :it?) No, I didn't say that at all. Using my theory, you don't eliminate all passwords, you move them off the machine (e.g. move to NIS or something) so if a hacker breaks into your multi-user box with a compromised password, he has no way to get the *REST* of the passwords (crypted or not) and break them offline. So moving the passwords off the machine (or removing them) accomplishes something real. Setting schg on a file does not. You think this would slow a hacker down? You think it's raising the bar? It might raise the bar a millimeter or so if the hacker is even more stupid then your typical script kiddie. Otherwise, no. A prudent sysad implements security features that actually have a reasonable effect. Setting schg on a file doesn't. It might give you a false piece of mind, but it will have no positive effect and almost certainly have a major negative one. At BEST we monitored hackers all the time. Do you want to know what they did when they got frustrated? 'rm -rf /' is what they did... fortunately, at BEST, the only times they did that was when they couldn't break root so all they did was wipe the user's account. Once a hacker breaks root, all you can do is mitigate the damage... but before you can mitigate it, you have to *detect* that your machine has actually been compromised. The easiest way to detect 98% of compromised machines is to locate modified binaries or new suid binaries. Take that away and you've just blown 98% of the effectiveness of your security system. -Matt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200105292338.f4TNciU32058>