Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jun 2002 18:41:19 +0200
From:      Patrick Atamaniuk <patrick-lists@atabersk.de>
To:        Robin Smith <rasmith@aristotle.tamu.edu>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Permit root login, was Re: OpenSSH hole
Message-ID:  <20020626184118.A16530@mail.atabersk.de>
In-Reply-To: <200206261326.g5QDQb8t090120@aristotle.tamu.edu>; from rasmith@aristotle.tamu.edu on Wed, Jun 26, 2002 at 08:26:37AM -0500
References:  <200206261326.g5QDQb8t090120@aristotle.tamu.edu>

next in thread | previous in thread | raw e-mail | index | archive | help

--HcAYCG3uE/tztfnV
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hi,
=2E..
Robin Smith(rasmith@aristotle.tamu.edu)@2002.06.26 08:26:37 +0000:
>=20
> However, if the connecting user happens to be root (i.e. if
> PermitRootLogin is on), then there's no split (and even if there were,
> both would be owned by root, of course).  I haven't heard anything
=2E..
sorry going off topic, but here my 2cent:
Though i don't know the effect on privsep, i generally recommend
 don't permit root-login.
Have administrative users without valid passwords but not empty passwords
( * in the password field) using ssh keys
and invite only them into wheel. Only the root account should have=20
a (secure, complicated) password for 'su' and console login.
 Even if you need root-login for automated adminstration purposes, this
can be done with root-login disabled by using ssh-keys in combination with
the command=3D"" parameter in the authorized_keys file.

Reasoning:
 Always assume your (master)passwordfile is compromized. Assume i'ts public=
 :)

 Getting onto the machine by using social engeneered or otherwise
 obtained passwords is simply not possible due the absence of passwords.

 Knowledge of the root password does not help if you don;t have pysical acc=
ess or a
 ssh-key to an admins account if no user even has a password.

If the attacker has physical access, we are lost anyways (bios password=20
may help but might have disadvantages if you are colocating)

Of course the private keys for the administrative clients
must be protected by passphrase and site policy.

I think i stole that idea from FreeBSD handbook:)

regards,
 /p
--=20
regards,
        Patrick

----------------------------------------------------
Patrick Atamaniuk       patrick@atamaniuk.de

http://www.atamaniuk.de
http://www.top-c.de
----------------------------------------------------
80B0BCF6 D/E D624 96A8 22A9 1ED2 77F3  A0C5 78C0 14F9 80B0 BCF6
My mail is GnuPG signed -- Unsigned ones are bogus -- http://www.gnupg.org/
Please do not remove my address from To: and Cc: fields in mailing lists.


--HcAYCG3uE/tztfnV
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE9Ge6teMAU+YCwvPYRAowwAKD6bVD6YmnBpkG1bUeyjESbz1JiDACeKFhI
XJbNhFDM4KJa0YvPp+F3XSI=
=1+YP
-----END PGP SIGNATURE-----

--HcAYCG3uE/tztfnV--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020626184118.A16530>