Hi again.

Out of this thread, Mr. Tongson pointed me to an interesting post
from march 2005:

  http://archives.neohapsis.com/archives/openbsd/2005-03/2808.html

>From this post, it is difficult understanding why disabling remote
root logins is not a good idea; but after reading the entire thread
I see the point, though: disabling remote root logins make things
a bit harder for an intruder, but not impossible at all.  I agree
with the idea on the thread but we must consider that:

  1. Allowing remote root logins by default effectively destroys
     the security layer created by the wheel group.  Even if an
     attacker is able to get a copy of the root password (something
     that cannot be underestimated for an internal employee) he
     must be in the right group or get a second password, this time
     one of a user in the wheel group.

  2. There are a lot of brute force attacks from countries like
     Korea these days.  These attacks will be less effective if
     the intruders get access to an unprivileged account (even if
     it is in the wheel group).

  3. An Unix and Unix-like system has a root account.  The names
     of other accounts are difficult to guess (my account at
     string1 is guessable right now, but I can be using a mail
     alias or receiving email on a system that has no real user
     accounts).  Trying brute force attacks against the root
     account is probably the best guess for an intruder.

I must admit I did not know about that thread before Mr. Tongson
sent me an email, and I would probably have not sent my first email
in the case I were aware of the existence of the thread of march,
2005.  But I think that I am right about remote root login enabled
by default weaknessing other security schemes (like the wheel group)
provided by the BSD systems.

I agree with Mr. Dippel about the problems related with remote installs
of OpenBSD.  Certainly the problem described in his post is not an usual
one, only a few managers make remote installs.  I have a net4801 and
it is upgraded locally, using my laptop as an DEC VT compatible terminal
connected to it.  I can imagine how difficult it must be installing an
OpenBSD release remembering that "remote root logins must be enabled
before halting the system".  In any case, there are some good approaches
to this problem.  For example:

  - setting up a terminal/port server to manage these devices as if
    it were local.  In any case, how can be the installer be used
    without a sort of terminal (either local or remote) connected
    to the device?

  - add a siteXX.tgz tarball to the installation sets with required
    changes for that specific -and challenging- environment.

I admit that not allowing remote root logins is an imperfect security
measure, but at least do not breaks the security introduced by the
wheel group in the BSD systems.  On the other hand, the number of
threats based on brute force attacks against root (the only account
that exists on nearly all the Unix and Unix-like operating systems)
are increasing in the last years.  Some of these tools try passwords
that I would not call "low-quality ones".

Best regards,
Igor.

Reply via email to