[NTLUG:Discuss] DistroWatch 10 Most Popular Linux Distros
Leroy Tennison
leroy_tennison at prodigy.net
Sat Apr 4 21:30:29 CDT 2009
Kenneth Loafman wrote:
> terry wrote:
>> On Fri, Apr 3, 2009 at 12:01 PM, Kenneth Loafman <kenneth at loafman.com> wrote:
>>> terry wrote:
>> Why then does the user only have to do use sudo to set password for
>> root in order be able to log in as root from then on? Or until it is
>> changed back... $sudo passwd root & and then $sudo passwd -l root to
>> set it back and disable root login again.
>>
>> But that little trick is not necessary in the first place because one
>> only has to do
>> sudo su
>> or
>> sudo -i
>> and he/she obtains a root shell.
>
> It was meant to discourage, not to disable, access to root. Most users
> coming from Windows would not know how to do that. It's an interesting
> example of security by obscurity.
>
>> Some users, (especially novice users) may use a pretty weak password
>> for their user account, which DOES in fact afford several avenues for
>> admin priviledges. If they install openssh-server, how in the world
>> that can be considered as a security enhancement is going to be pretty
>> hard to explain, but I'm quite willing to listen if anyone would like
>> to give it a shot.
>>
>> That's the reason I say that it is a good thing that openssh-server is
>> not installed by default. I think it may have opessh-client installed
>> but not openssh-server on a default Ubuntu / Kbuntu / Mint install,
>> but one only has to do sudo apt-get install openssh-server and away
>> you go - if you do not have a good firewall between yourself and an
>> untrusted network you darn sure need a good strong password for user.
>> In comparison, if it were a normal linux distro that has a good strong
>> root password and (to go a step further) if sshd is limited only to
>> user and not root - (which in my opinion ought to be the default
>> configuration), we must admit, we'll be a lot better off.
>> I welcome any criticism or challenge to my assumptions, but at this
>> point, I can't see it any other way.
>
> I have to agree w.r.t. ssh access. I think root access is defaulted to
> off in Ubuntu's ssh server, but I can't remember. I always check it
> anyway. If the user has a weak password, and he's admin, then there is
> a security hole there anyway, but there would be one even if he did not
> have admin rights. All it takes is to have sudo privs and you're off.
> Giving the first user admin rights is just a convenience. Giving them
> sudo rights is the security hole.
>
> If you don't give them any rights, they'll just sign on as root and stay
> there and we know that's bad. So, where's a good middle ground?
>
>> I must admit tho, that we sometimes need protection from ourselves.
>> If someone is insane enough to log in as root and use it as if it
>> were a user account, well yes, they could initiate a GUI and get on
>> the internet with the machine and it is just a disaster waiting to
>> happen - and yes, I know, and X-MS user may very well do just that -
>> even if they are instructed not to, and so in that way, yes, even I
>> would have to admit that in that situation, a Ubuntu system is the
>> only linux distro someone in that mindset should ever get hold of --
>> Ubuntu is probably the best security someone like that could possibly
>> have, because it protects one from one's self. But as far as
>> protection from the outside, there is no way [at this point] I could
>> consider it a valid excuse for disabling root and giving admin
>> priviledge to the user.
>>
>> And yes, I did - I stole your argument - I had every intention of
>> letting you make it for yourself.... but just couldn't stop
>> myself..... sorry.... I get to typing and the keyboard just carries me
>> away sometimes.... :)
>
> It's a hard choice in a distribution, and I'm sure Microsoft went
> through some of the same arguments. It's all a balancing act, user
> convenience vs security. Imagine a Windows user sitting down to a
> highly secured SELinux or BSD system and imagine how long it would take
> him to go back to Windows. That, regrettably, is the decision process
> the distro makers have to manage to answer. Security is not convenient,
> and convenience is not security. It's all a tradeoff, and the tradeoff
> generally made is to entice users to stay, thus convenience.
>
> Every user we can convert is one more we still have to educate, and one
> more chance to teach about security in general. At the very least,
> think of it as one less Windows system on the internet.
>
> ...Ken
>
> _______________________________________________
> http://www.ntlug.org/mailman/listinfo/discuss
>
"Imagine a Windows user sitting down to a highly secured ..." Windows
system! What do you mean, imagine? Compliance + Active Directory =
exactly this. I have production machines at work that I can't even
logon to. The fact that I might need to do so to troubleshoot or
support the environment is far too lofty a thought to be considered by
those making the decisions (given my previous replies, three guesses,
first two don't count: the evil bane of society - Compliance).
More information about the Discuss
mailing list