/etc/suauth

Sean McMahon smcmahon at usgs.gov
Mon Dec 19 12:52:16 EST 2005


Perhaps the original poster could simply tell us where he obtained this
information.  Think we're talking about 2 different things here.
----- Original Message ----- 
From: "Adam Myrow" <amyrow at midsouth.rr.com>
To: "Speakup is a screen review system for Linux." <speakup at braille.uwo.ca>
Sent: Saturday, December 17, 2005 3:40 PM
Subject: re: /etc/suauth


> On Sat, 17 Dec 2005, Jude DaShiell wrote:
>
> > The analysis is flawed.  A machine with 99 user accounts on it and a root
> > account with only one line in /etc/suauth with one user account on it
> > presents a hacker with 98 decoys and one hackable account.  The hacker has
to
> > go to the trouble of stealing a user account password not a root account
> > password and that is more difficult to do.
>
> I fail to see why you don't understand the problem you would create.
> Essentially, you would be saying that any of your 99 users may su to root
> without knowing the root password.  Any one of them could now do whatever
> they want without having to put forth any effort at all.  The hacker could
> be one of your users.  If you are so concerned with the root password
> getting out on the Internet, then you would be much better off forbidding
> the use of the su command entirely, or at least blocking attempts to su to
> root.  No ordinary user should be using it anyhow.  While you are at it,
> prevent root logins via SSH.  You can't do administration anywhere except
> the console this way, but it's a lot better than opening up your machine
> to anybody who just happens to try to su to root.
>
> _______________________________________________
> Speakup mailing list
> Speakup at braille.uwo.ca
> http://speech.braille.uwo.ca/mailman/listinfo/speakup





More information about the Speakup mailing list