Stewart Stremler wrote:

begin quoting JD Runyan as of Tue, Apr 19, 2005 at 09:39:35AM -0500:


2) root can read and write everything. root is the only user that can do this. If root is the only user, then attacks have access to everything



And? Why is this a concern?

-Stewart "It's all about the data. Everything else is replaceable." Stremler


Yes, but (as a single user) "replaceable" takes time. And what takes the most time is remembering all the downloads and installs and how to do them. This is one "single user" who cares about the time it will take me to recover my environment. I don't like how much I su to root, but I'm still learning and don't yet know a better way. I want to reduce my risk, and do so when I learn how. (For this reason, I just love these kinds of discussions for the tidbits that pop out, like "using SSH will give you thus-and-such" countered by "not unless you do this-and-that to the ports permissions" or the like. Sometimes, it gets spelled out enough for me to actually figure out.)


-- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to