Re: Remotely edit user disk quota

2009-05-31 Thread Wojciech Puchar
same user password somewhere else. The whole point of ssh is to prevent this sort of thing, by encrypting the message traffic over this insecure communication channel. I think most people using ssh already know it. or maybe not?:) An attacker may be able to intercept the encrypted traffic,

Re: Remotely edit user disk quota

2009-05-30 Thread Chris Rees
2009/5/29 Wojciech Puchar woj...@wojtek.tensor.gdynia.pl: Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: Even 15 seconds of thinking is enough to understand that logging to other user and then su - gives completely no extra security. I don't buy this, given that root's login name is

Re: Remotely edit user disk quota

2009-05-30 Thread Wojciech Puchar
But we're talking about vulnerability to dictionary and brute-force attacks. You'd have to first: Ascertain a username in the wheel group. As time needed to brute-force crack any of my password is incomparably longer than the age of universe, this is not an argument. It's just a matter to

Re: Remotely edit user disk quota

2009-05-30 Thread perryh
Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: Even 15 seconds of thinking is enough to understand that logging to other user and then su - gives completely no extra security. I don't buy this, given that root's login name

Re: Remotely edit user disk quota

2009-05-29 Thread Chris Rees
2009/5/28 Kirk Strauser k...@strauser.com: On Thursday 28 May 2009 02:34:02 pm Wojciech Puchar wrote: And yes - i do log as root by insecure rsh and telnet. OK, I'm now promoting you to batshit insane.  Seriously, there's no excuse for running telnet - even in a secure (ha!) environment -

Re: Remotely edit user disk quota

2009-05-29 Thread perryh
Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: Even 15 seconds of thinking is enough to understand that logging to other user and then su - gives completely no extra security. I don't buy this, given that root's login name is well known :) If a system accepts remote root logins, an

Re: Remotely edit user disk quota

2009-05-29 Thread Wojciech Puchar
for running telnet - even in a secure (ha!) environment - when so much better alternatives exist. Let me shoot you a hypothetical: your webserver gets compromised. Something I pointed out earlier. and what? assuming it will actually be possible to get root access at all because of bug it

Re: Remotely edit user disk quota

2009-05-29 Thread Wojciech Puchar
Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: Even 15 seconds of thinking is enough to understand that logging to other user and then su - gives completely no extra security. I don't buy this, given that root's login name is well known :) if someone can intercept the passwords you

Remotely edit user disk quota

2009-05-28 Thread Olivier Nicole
Hi, I am writing a Perl script to run on our web server. This script will be used to create user accounts. I can do almost every thing on the web server: - create the home directory - add a user in LDAP - create the MySQL database for that user The only thing I cannot do is to set the disk

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
- create the MySQL database for that user The only thing I cannot do is to set the disk quota: the home directory is NFS mounted from another machine acting as file server, the quota must be edited on the file server. How could I nicely and securely connect from the script on the web server to

Re: Remotely edit user disk quota

2009-05-28 Thread Olivier Nicole
How could I nicely and securely connect from the script on the web server to the file server, in order to edit the quota? It should be use rsh and .rhosts :) I do that already, not really what I call secure ;) As I put up a new machine, I'd prefer something else. Olivier

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
use rsh and .rhosts :) I do that already, not really what I call secure ;) Could you please explain why it is not secure in your case? I don't know exactly the environment in your case so i can't answer for sure, but most probably it's perfectly secure.

Re: Remotely edit user disk quota

2009-05-28 Thread Chris Rees
2009/5/28 Olivier Nicole o...@cs.ait.ac.th: How could I nicely and securely connect from the script on the web server to the file server, in order to edit the quota? It should be use rsh and .rhosts :) I do that already, not really what I call secure ;) As I put up a new machine, I'd

Re: Remotely edit user disk quota

2009-05-28 Thread Olivier Nicole
use rsh and .rhosts :) I do that already, not really what I call secure ;) Could you please explain why it is not secure in your case? I don't know exactly the environment in your case so i can't answer for sure, but most probably it's perfectly secure. Because rsh/rlogin etc. is

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
rsh and ssh are so similar in use there's really no point in using rsh at all any more. there is a point. Just try to think why instead of simply repeating a phrase ssh is secure, rsh is not, don't use it. ___ freebsd-questions@freebsd.org mailing

Re: Remotely edit user disk quota

2009-05-28 Thread Chris Rees
2009/5/28 Wojciech Puchar woj...@wojtek.tensor.gdynia.pl: rsh and ssh are so similar in use there's really no point in using rsh at all any more. there is a point. Just try to think why instead of simply repeating a phrase ssh is secure, rsh is not, don't use it. rlogin has several serious

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
sure, but most probably it's perfectly secure. Because rsh/rlogin etc. is unsecure in any case. I don't remember the very bad you don't remember the details. Let i give you an example. I throw 1000$ on my table in my flat. Is this money insecure? The answer is - maybe, it's just as secure

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
Due to these serious problems rlogin was rarely used across untrusted networks Good you finally pointed out the most important thing rlogin/rsh is insecure across untrusted network This is QUITE a difference between this and rsh is insecure. period rsh is as secure as the communication

Re: Remotely edit user disk quota

2009-05-28 Thread Chris Rees
2009/5/28 Wojciech Puchar woj...@wojtek.tensor.gdynia.pl: Due to these serious problems rlogin was rarely used across untrusted networks Good you finally pointed out the most important thing rlogin/rsh is insecure across untrusted network This is QUITE a difference between this and rsh is

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
Also, I think it's a bad idea to leave money lying round like that. That's why we have banks. More layers. like most people today you like overcomplexity, layers etc. But there are still people that prefer simplicity. You should have some respect to them.

Re: Remotely edit user disk quota

2009-05-28 Thread Jon Radel
Wojciech Puchar wrote: Also, I think it's a bad idea to leave money lying round like that. That's why we have banks. More layers. like most people today you like overcomplexity, layers etc. But there are still people that prefer simplicity. You should have some respect to them. Some.

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
respect to them. Some. But zero sympathy the day it all blows up in their faces due to just one little configuration error or, oops, exploit they didn't know about. what configuration error could you imagine. In my opinion there is bigger change to make a configuration error in more

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
rsh is as secure as the communication channel. If it can be considered secure - DO USE rsh, because it's fastest as it doesn't have any encryption overhead. Are you on a 386? depends, between pentium I and core2 quad. what's a difference? ___

Re: Remotely edit user disk quota

2009-05-28 Thread Kirk Strauser
On Thursday 28 May 2009 08:53:23 am Wojciech Puchar wrote: depends, between pentium I and core2 quad. what's a difference? Well, I can transfer 25MB/s between hosts on the LAN without my CPU ever breaking 10% CPU usage. I'm of the opinion that most people don't need to optimize for CPU in

Re: Remotely edit user disk quota

2009-05-28 Thread Kirk Strauser
On Thursday 28 May 2009 06:13:11 am Wojciech Puchar wrote: rsh is as secure as the communication channel. If it can be considered secure - DO USE rsh, because it's fastest as it doesn't have any encryption overhead. Are you on a 386? -- Kirk Strauser

Re: Remotely edit user disk quota

2009-05-28 Thread Vincent Hoffman
On 28/5/09 15:04, Kirk Strauser wrote: On Thursday 28 May 2009 08:53:23 am Wojciech Puchar wrote: depends, between pentium I and core2 quad. what's a difference? Well, I can transfer 25MB/s between hosts on the LAN without my CPU ever breaking 10% CPU usage. I'm of the opinion

Re: Remotely edit user disk quota

2009-05-28 Thread Polytropon
On Thu, 28 May 2009 12:15:22 +0100, Chris Rees utis...@googlemail.com wrote: Also, I think it's a bad idea to leave money lying round like that. That's why we have banks. More layers. No. We have benks because they make it easier to steal people's money more silently, so they notice when it's

Re: Remotely edit user disk quota

2009-05-28 Thread Polytropon
On Thu, 28 May 2009 09:04:43 -0500, Kirk Strauser k...@strauser.com wrote: Well, I can transfer 25MB/s between hosts on the LAN without my CPU ever breaking 10% CPU usage. I'm of the opinion that most people don't need to optimize for CPU in such cases when the security payoffs are so great.

Re: Remotely edit user disk quota

2009-05-28 Thread Chris Rees
2009/5/28 Polytropon free...@edvax.de: On Thu, 28 May 2009 09:04:43 -0500, Kirk Strauser k...@strauser.com wrote: Well, I can transfer 25MB/s between hosts on the LAN without my CPU ever breaking 10% CPU usage.  I'm of the opinion that most people don't need to optimize for CPU in such cases

Re: Remotely edit user disk quota

2009-05-28 Thread Polytropon
On Thu, 28 May 2009 18:04:23 +0100, Chris Rees utis...@googlemail.com wrote: [The OP] even said 'secure' twice. There is a web server involved, meaning possibility of compromise (we all know how secure web servers tend to be), and then one has access to network traffic for sniffing. Also, if

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
Well, I can transfer 25MB/s between hosts on the LAN without my CPU ever breaking 10% CPU usage. probably true, i never checked actually. i just don't understand such reasoning that you have to waste (even small) CPU power without sense. For example local private LAN or already-encrypted VPN

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
good as the weakest point. Of course you can add security by using SSH, and it's definitely indicated when doing things via the Internet. As long as you are inside your own net, covered from the Internet, with only trustworthy machines inside it, you could even use telnet. which i actually do.

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
I know I sound like Theo, but security and reliability are ALWAYS more important than overhead or speed. I really agree with You. That's why every admin (and user too) should think about what is he/she doing, instead of repeating the same mantras about security/insecurity of something.

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
But if it is, why not? At least, the OP's description involving some time ago i heard from linux user that rshd is removed at all because it's insecure. Just got another example how good decision i made moving away from it. ___

Re: Remotely edit user disk quota

2009-05-28 Thread Kirk Strauser
On Thursday 28 May 2009 02:34:02 pm Wojciech Puchar wrote: And yes - i do log as root by insecure rsh and telnet. OK, I'm now promoting you to batshit insane. Seriously, there's no excuse for running telnet - even in a secure (ha!) environment - when so much better alternatives exist. Let

Re: Remotely edit user disk quota

2009-05-28 Thread Wojciech Puchar
And yes - i do log as root by insecure rsh and telnet. OK, I'm now promoting you to batshit insane. Seriously, there's no excuse thank you very much. while i don't know exactly what is a difference between batshit insane and insane i feel really proud!