Incoming from Aaron Seigo:
> On October 5, 2004 9:02, s. keeling wrote:
> > In some jurisdictions, doing what you're asking would open you up to
> > accusations of complicity and legal action on the part of third
> > parties attacked by your network.
> 
> i'd be surprised if allowing remote root logins would create any sort of 
> resultant liability issues.

"In some jurisdictions ..."  US tort law is broken.  Any nitwit can
drag you into court and sue you with few to no ramifications.  At
least here, the loser generally has to pay court costs.

> ........................... in fact, it's probably easier for a cracker to 
.......................................^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> gain root once local to the box than it is to do so remotely using a password 
..^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Is that not an argument in favour of forcing them to get a local
account first?!?

> attack. and it's not like they can't do a password attack if they log in as a 
> user. 

... And if your root account is still intact, and you have enough
smarts to watch the box and its logs, presumably you'll receive some
notification that it's happening.  If he has root, he can do it
stealthily, and you'll only hear about it when someone complains.

If you have any reasonable justifications to throw away good security
practices, by all means, tell us.  "It's a pain" is hardly in that
category.


-- 
Any technology distinguishable from magic is insufficiently advanced.
(*)               http://www.spots.ab.ca/~keeling 
- -

_______________________________________________
clug-talk mailing list
[EMAIL PROTECTED]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to