From: Alan McKinnon <alan.mckinnon@gmail.com>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] Rooted/compromised Gentoo, seeking advice
Date: Tue, 10 Aug 2010 20:50:49 +0200 [thread overview]
Message-ID: <201008102050.49976.alan.mckinnon@gmail.com> (raw)
In-Reply-To: <AANLkTi=x3ttjbgf0pXcwiYKRF_dcE0OHoRKD-U+2bdr4@mail.gmail.com>
On Tuesday 10 August 2010 15:03:19 Kevin O'Gorman wrote:
> On Mon, Aug 9, 2010 at 6:18 PM, William Hubbs <williamh@gentoo.org> wrote:
> > On Mon, Aug 09, 2010 at 05:30:40PM -0700, Kevin O'Gorman wrote:
> > > On Mon, Aug 9, 2010 at 1:20 PM, Bill Longman <bill.longman@gmail.com>
> >
> > wrote:
> > > > I actually prefer "sudo su -" -- as long as I'm giving it away! :o)
> >
> > Afaik, there is no reason for "sudo su -" It should be either
> >
> > su -
> >
> > or, if you are using sudo,
> >
> > sudo -i
> >
> > The disadvantage of "su -" is that it requires the user to know the root
> > password. But, "sudo -i" does the same thing without requiring the user
> > to know the root password.
> >
> > You either didn't think or didn't actually try it. "sudo su -" needs a
>
> password, but it's the
> user password. Running su as root never needs a password. Accordingly,
> this works on
> a stock Ubuntu with no root password.
>
> "su -" requires the root password unless you're already root, and the root
> password may or may not exist.
>
> I didn't know about "sudo -i" (thanks), but when I tried "sudo -i" it
> immediately asked for a password, for which
> the user password was sufficient. So it's entirely equivalent to but
> slightly shorter than my version. I'll stick with
> mine because it's made of parts I already know and won't forget.
>
> I think that if sudoers don't need to enter passwords, they're still
> equivalent, but I have not tried this.
Sounds to me like he's whinging about sudo and not much else. I find this to
be common and far too many people advancing the idea can't define to me basic
security concepts. I have also yet to meet someone with a beef against sudo
that can show a fundamental weakness with it, and I'm not talking about an
isolated case of buffer overflow either - that can happen with any software. I
mean a weakness in the methodology of sudo itself.
Many people have a stuck idea in their heads that the root password is a magic
security bullet. In fact, it's no such thing. Like any other password it is
simply something you need to prove you know in order to to authenticate
yourself. The major threat by analysis on a workstation is stepping away for a
leak and forgetting to lock the screen. sudo is adequate protection against
this as long as more than 5 minutes have elapsed since the last sudo was run -
the prankster may have access to the machine but still does not know any
password, including yours. A major threat to finding passwords is shoulder
surfing. If one frequently enters the root password, it is equally easy for a
shoulder surfer to find it as to find the user's password. Note that if you
leave your workstation unlocked with a root session open, there is no such
timeout as what one has with sudo.
Additionally, on a shared machine (i.e. server at work), the root password has
to be shared which is a huge hole in itself due to the difficulty of
communicating the new password when it is changed. It is trivially easy to
communicate a single password for a single user and guarantee it stays secure
(major advances in cryptanalysis excepted).
--
alan dot mckinnon at gmail dot com
next prev parent reply other threads:[~2010-08-10 19:11 UTC|newest]
Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-08-09 16:25 [gentoo-user] Rooted/compromised Gentoo, seeking advice Paul Hartman
2010-08-09 16:48 ` Alan McKinnon
2010-08-09 18:48 ` Paul Hartman
2010-08-09 18:59 ` [gentoo-user] " 7v5w7go9ub0o
2010-08-09 19:08 ` Paul Hartman
2010-08-09 19:46 ` Mick
2010-08-10 13:50 ` Kyle Bader
2010-08-09 19:09 ` [gentoo-user] " Mick
2010-08-09 20:08 ` Robert Bridge
2010-08-09 20:20 ` Bill Longman
2010-08-10 0:30 ` Kevin O'Gorman
2010-08-10 1:18 ` William Hubbs
2010-08-10 6:42 ` Alan McKinnon
2010-08-10 13:03 ` Kevin O'Gorman
2010-08-10 18:50 ` Alan McKinnon [this message]
2010-08-10 19:22 ` Hazen Valliant-Saunders
2010-08-10 23:23 ` Peter Humphrey
2010-08-11 16:55 ` Stroller
2010-08-11 18:16 ` Dale
2010-08-11 20:30 ` Alan McKinnon
2010-08-11 22:11 ` [gentoo-user] Rooted/compromised Gentoo, seeking advice - AKA passwords Bill Longman
2010-08-11 23:09 ` Alan McKinnon
2010-08-12 4:30 ` Bill Longman
2010-08-12 13:01 ` [gentoo-user] Rooted/compromised Gentoo, seeking advice Stroller
2010-08-12 19:21 ` Alan McKinnon
2010-08-12 19:43 ` Peter Humphrey
2010-08-12 20:14 ` Alan McKinnon
2010-08-12 12:56 ` Stroller
2010-08-13 2:11 ` Dale
2010-08-11 16:58 ` Stroller
2010-08-11 20:26 ` Alan McKinnon
2010-08-09 20:25 ` Dale
2010-08-09 21:22 ` Mick
2010-08-09 22:19 ` Dale
2010-08-09 21:17 ` Philip Webb
2010-08-09 23:07 ` Paul Hartman
2010-08-10 2:14 ` Frank Steinmetzger
2010-08-10 2:24 ` Indexer
2010-08-11 1:05 ` Walter Dnes
2010-08-11 2:16 ` Dale
2010-08-11 4:36 ` Walter Dnes
2010-08-11 5:37 ` Dale
2010-08-10 2:30 ` Keith Dart
2010-08-10 3:06 ` Adam Carter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=201008102050.49976.alan.mckinnon@gmail.com \
--to=alan.mckinnon@gmail.com \
--cc=gentoo-user@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox