You are not logged in.
I had a thought the other day that went something like this:
Ubuntu disables root's account so that nobody can pass-crack it.
That's a decent idea unless I want to do a bunch of admin stuff as I turned the sudo timeout to zero.
But a cracker only has to guess your password because he/she already knows that the admin account is named root. At least on a Windows machine, if you aren't logged in as the Admin, they have to guess the Admin's account name as well.
But I have come up with a solution! What if we disable the root account, like Ubuntu, but set up another user that has the no password option set in the sudoers file? You could use that account for admin stuff instead of root.
Of course, you'd have to type 'sudo' before everything, which would be annoying...
Offline
You know that with "sudo su" you'll get a root shell right?
Offline
Or you could make it so that your user is only allowed to run sudo from the local machine...
[git] | [AURpkgs] | [arch-games]
Offline
you don't need to create extra account to protect root. It looks like you would assume that someone who can get one password will not try to get another. This is so popular in windows world that I doubt someone with ability to catch passwords will get "confused".
Set root password, set up group that has access to root account without root password. This way you will never pass root password, root is password protected so nobody except privileged group has access to root account, if member of privileged group goes rouge, remove him from privileged group (group does need to know root password). Members of privileged group can't change root password because they don't know the password that is currently set up.
This is a simple way of controlling privileged account/password and still having last word.
Simply modify pam (there already settings for this, you need to activate them simply).
Offline
Of course, you'd have to type 'sudo' before everything, which would be annoying...
sudo -i
Offline
pam-usb is nice too.
http://aur.archlinux.org/packages.php?ID=2797
and you use it like a key.
Offline
Disabling root is the stupidest thing I have ever heard.
Unless you're running a website nobody really cares about hacking you, they'd much rather get a million on Windows than a few on Linux.
Personally, I'd rather be back in Hobbiton.
Offline
Now that's funny... Tell that to the people who's been hacked without running a website. I'm sure they'll agree with your cunning analysis.
Pogeymanz: I'm not sure how useful 'disabling' the root account is. There's always something running with root powers and once you can get that hacked.
Even denying root access e.g. over SSH will not help a lot. As soon as someone gets in, it's just a matter of time before he gains root powers.
Got Leenucks? :: Arch: Power in simplicity :: Get Counted! Registered Linux User #392717 :: Blog thingy
Offline
Now that's funny... Tell that to the people who's been hacked without running a website. I'm sure they'll agree with your cunning analysis.
how true
completely disabling it is not the best idea BUT nether is auto root login
there have been a bunch of people asking for that.
Celestia maps
http://celestiamotherlode.net/catalog/s … ator_id=10
Offline
OK so I'm not definite. You win.
Personally, I'd rather be back in Hobbiton.
Offline
I'm pretty sure you're free to set something like this up on your own if you wish? I don't think most people like hacks like this by default because if we want to do that we'll go ahead and do that ourselves. Having to mess with reversing it would likely be a bit of a PITA unfortunately since having a root account is pretty standard behavior. Also there are all sorts of other utilities you can use to help stop crackers. For example, denyhosts.
Offline
Even denying root access e.g. over SSH will not help a lot. As soon as someone gets in, it's just a matter of time before he gains root powers.
The point of disabling root access via ssh isn't so much (IMO) about decreasing the security impact of an attacker getting ssh access to your scene, so much as it is to make brute force attacks more difficult; w/ root account login disabled you have to guess a valid username and either a password or key. So it's definitely a good idea to disable root logins via ssh, or at the very least limit them to key-based authentication.
I don't think there's any security benefit to completely disabling the root account ... because you absolutely need some account with elevated privileges and if that account gets compromised, it's just as bad as if someone got root.
Offline
the best protection is abstinence but at least never interface without protection.
I feel that the best way to go about protecting your pc is through basic standard security precautions such as port forwarding, regularly monitoring log files,
and secure passwords that are regularly changed. You can even find a couple of utilities that generate passwords for you (really nice ones like !GBFO2fh23~!sdf9**(1`)
the more of a mix you have in a password, the more difficult it will be to crack. most of the more common hashes out there I've seen will crack an alpha-numeric password in a heart beat,
but even throwing a couple symbols in there will stymie them.
Hofstadter's Law:
It always takes longer than you expect, even when you take into account Hofstadter's Law.
Offline
^ Or you could have a life and not think that the whole world is going to attack YOUR computer... Even if that happens you would have much more waisted time on "checking" logs rather than fixing the damn thing.
People this days.
Offline
^ Or you could have a life and not think that the whole world is going to attack YOUR computer... Even if that happens you would have much more waisted time on "checking" logs rather than fixing the damn thing.
People this days.
Or you could not exaggerate.
It doesn't take the whole world, just one person with a working brain, and last I heard, stuff like social security numbers was worth quite a fair bit.
Ten minutes a day to securing your computer and online activities does not seem unreasonable.
Offline
Don't keep your social security number on your computer. Why would you even have it on there?
Personally, I'd rather be back in Hobbiton.
Offline
Don't keep your social security number on your computer. Why would you even have it on there?
Lots of places some don't usually think of, like browser cache, etc. (though this shouldn't happen, it does), and other local documents.
That was just one example, though.
Go on a case-by-case basis. I'm pretty sure that if my computer were taken and searched by someone else, they'd have quite a bit of blackmail on me, including perhaps some legal trouble.
If it's grandma's web machine, perhaps not so much (but then again, those less computer-inclined tend to make mistakes like the social security stuff more often).
Offline
It's really simple to stop someone from brute forcing your root account or any other account. Use a module like fail2ban, pam_abl, etc that ban a username and/or ip address after a certain number of failed login attempts (say 5).
Then there is no need for insane passwords like !GBFO2fh23~!sdf9**(1` that no one can remember, no need to change passwords frequently (what a pain in the butt, who can remember their password when they're constantly changing it?).
No one is guessing even a fairly simple password in 5 attempts, especially if you don't use a dictionary word.
Offline
Now that's funny... Tell that to the people who's been hacked without running a website. I'm sure they'll agree with your cunning analysis.
[sing-song:] Oh, Phrakture...?
Last edited by Wintervenom (2010-04-29 02:39:33)
Offline
What!? Phrak was hacked?! ohmigod
Offline
It's really simple to stop someone from brute forcing your root account or any other account. Use a module like fail2ban, pam_abl, etc that ban a username and/or ip address after a certain number of failed login attempts (say 5).
Then there is no need for insane passwords like !GBFO2fh23~!sdf9**(1` that no one can remember, no need to change passwords frequently (what a pain in the butt, who can remember their password when they're constantly changing it?).
No one is guessing even a fairly simple password in 5 attempts, especially if you don't use a dictionary word.
excellent point! I forgot to mention that. however, I still stand by my secure password philosophy, but I guess to each their own
Hofstadter's Law:
It always takes longer than you expect, even when you take into account Hofstadter's Law.
Offline
I'm a user that nobody would have much interest in attacking...no important information and my bank account is hideous. However, when I first installed ssh, I saw upload spikes...someone from shanghai was bruteforcing my account. Using a different port and a dsa 1024 bit key fixed that.
Offline
f0110\/\/ t|-|3 y3110\/\/ br!ck r04d
Offline
I'm a user that nobody would have much interest in attacking...no important information and my bank account is hideous. However, when I first installed ssh, I saw upload spikes...someone from shanghai was bruteforcing my account. Using a different port and a dsa 1024 bit key fixed that.
People certainly will and DO try to brute force their way into machines. I started logging and monitoring heavily failed logins on a cluster i admin out of curiousity and saw up to thousands of attempts per day from all over the world. Coincidentally a large majority trace back to a certain ISP in southeast Asia that must be pretty loose with their own monitoring.
But I don't worry since the root password is like 18 characters, usernames are not dictionary words or just common names, and passwords are not allowed to be so simple they can be cracked in 5 attempts (the point at which my pam_abl blocks potential intruders).
I guess my whole point is, there are tons of people that will try to brute force attack systems and you do need a plan. However there are some fairly simple plans that don't require huge unrememberable passwords that are changed every couple months.
Offline