On 13.01.2008 01:45, M. Edward (Ed) Borasky wrote: > Typical Linux practice is the following: > > 1. One *never* allows remote shell login as "root" -- *ever* -- even > behind a firewall. One allows only *one* user in the "wheel" group to > log in to a shell account, and then *only* via "ssh". >
Which is almost as unsafe as using "root" directly. > 2. When root access is needed, "sudo" is used, with the least permissive > mode possible. > And once you start installing software globally via sudo, the account from which you called sudo to install software is (in almost all circumstances) effectively "root". Same goes for bootloader configuration. > 3. "ftp" is done using "sftp" and/or "scp". For Windows clients, there's > PuTTY. > Agreed. > Anything less than this level of security is a bad habit -- a *very* bad > habit. Please don't encourage such habits, or ask the open source > community to cater to them. > Actually, I would consider the belief that sudo makes things unconditionally safer to be mostly equivalent to the belief that a "personal firewall" (which is not a firewall) makes things unconditionally safer. IMO, use of sudo should be discouraged because it gives people a false sense of security. It is possible to use sudo in a safe way. Same goes for the "root" account. And then there are those people who run "sudo bash". Although they violate your point 2, they prove part of my point. Many people interpret complicated or work-intensive interfaces as damage and work around them. Often the workaround not only neutralizes the intent of the original interface, it actually makes things worse from the perspective of the person who tried to impose the interface on them in the first place. Have you ever worked at a place where people were required to change their passwords every month and the new password was not allowed to match any of the last n passwords? I have seen that and assure you that it worsens security. People start to put their password as post-it-note on their monitor. Once you manage to stop the post-it habit, they figure out that a rotating list of passwords constructed like "secret1, secret2, secret3..." works fine. If the system notices that passwords are similar, there's at least some chance one guy knows another guy who then tells someone in upper management that if the system is able to find similarities between passwords, they surely are not stored with a cryptographically secure hash function. Regards, Carl-Daniel _______________________________________________ Devel mailing list Devel@lists.laptop.org http://lists.laptop.org/listinfo/devel