On Tue, Jun 04, 2013 at 12:43:08PM +0200, helix84 wrote:
> OK, I didn't mean to start a discussion, just wanted to give you a
> point to think about, so let me just repeat the single point I made:
> 
> In the particular common case I described, there is no difference in
> risk (neither its likelihood nor its impact) between compromising the
> tomcat account and the root account.

I think I disagree.  root can do anything, while service accounts are
usually carefully limited, and can't create new accounts, replace
system software, etc.  Compromise Tomcat and you've compromised
Tomcat; compromise root and you've taken over the machine, and can
take arbitrary actions within the security perimeter.

In the DSpace context, would it be fair to say that, while developers
take reasonable care, DSpace is not tested to run as root and should
not be so used?

-- 
Mark H. Wood, Lead System Programmer   [email protected]
Machines should not be friendly.  Machines should be obedient.

Attachment: signature.asc
Description: Digital signature

------------------------------------------------------------------------------
How ServiceNow helps IT people transform IT departments:
1. A cloud service to automate IT design, transition and operations
2. Dashboards that offer high-level views of enterprise services
3. A single system of record for all IT processes
http://p.sf.net/sfu/servicenow-d2d-j
_______________________________________________
DSpace-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspace-tech
List Etiquette: https://wiki.duraspace.org/display/DSPACE/Mailing+List+Etiquette

Reply via email to