Jim Cheetham wrote:

On Aug 5, 2005, at 6:27 PM, Robert Himmelmann wrote:

Jim Cheetham wrote:

lol. "sudo su" is almost pointless ... "sudo -s" gives you a root shell :-)

Ok, I do not have much experience with sudo and typing 'u' is for me easier than '-'.

:-) agreed. Functionally they are very similar - in internal detail they are very different. Most of the time people are interested only in functionality ...

I commented everything in /etc/sudoers. I do not like sudo. Normally two thirds of the commands I use I do as root.

I left one line which lets root use sudo. I do not think that that line is harmfull

Then, remove sudo. If you have disabled it like that, why not remove it completely? (One answer - because distribution dependancies might try to prevent you. The answer to that might be Slackware or Linux From Scratch)

Maybe not even that:

ubuntu / # apt-get remove sudo
Reading package lists... Done
Building dependency tree... Done
The following packages will be REMOVED:
 gdm gksu gnome-netstatus-applet gnome-system-tools sudo ubuntu-base
 ubuntu-desktop
0 upgraded, 0 newly installed, 7 to remove and 0 not upgraded.
Need to get 0B of archives.
After unpacking 18.2MB disk space will be freed.
Do you want to continue [Y/n]?


One of my friends used to do everything on his laptop as the root user. After all, he owned the machine, didn't he? (There's no downside to the story. He never made a costly mistake ;-) Yes, he's that good).

I don't trust myself that much. It is also useful to have one account that is known to work.

It's up to you how hackable you leave your system. :-)

I can rely on security through obsurity. By modifing the keyboard layout for my own needs I have made it very difficult to use for anyone else. The only problem with this is that it is difficult for me to use any computer on which I have not copied that layout.

I've supported so many different systems that I've instead become able to use the most default system to do my job. Even on a machine that I expect to use for years, I make very few changes. If you heavily customise your machine, I advise you to also make sure that you can copy and re-apply those essential customisations to a default machine, quickly ;-) It's worth spending a bit of time generalising your setup, because if you get a new stock machine, it will take you much longer when you really need to get it done. I think that's some variation on the laws of thermodynamics ... ;-)

I use xmodmap. I tried my layout on an Italian laptop I got from my brother and it works fine. You only have to be at the stage where you do not look at your keyboard. If I do that I always get confused. For my next system I will try to get a keyboard with blank keys.

nmap shows that I have only one open port which is ssh and which I disable when I do not need it.

Unless you are explicitly asking nmap to probe every port, be aware that it only usually scans a few thousand likely target port numbers by default. Better to use netstat or the excellent "lsof -i TCP" and "lsof -i UDP" to say what ports you really do have open.

The only line I get:
sshd    6611 root    3u  IPv4  13653       TCP *:ssh (LISTEN)


*cough* same friend as above - always disables ports he doesn't need. He plugged his laptop into my network this afternoon ... I nmapped him. One open port - distccd. Hmmm ... he's a gentoo user, that's why he has distcc running.

Only one distribution? That would mean that he can only use emerge to install programs.

Google says ...
http://www.metasploit.com/projects/Framework/exploits.html#distcc_exec
http://distcc.samba.org/security.html
<quote>The server completely trusts an authorized client. A malicious client could execute arbitrary commands on the server.</quote>
Perhaps he isn't that good after all?

I tried distcc as well. There is one function with which you can authorise only clients from certain IPs and domains. There are also options such as running everything in a chroot, switching to a certain user &c. I doubt that he used these. The safest way is probably running it over ssh.


:-)

Like I said, "It's up to you how hackable you leave your system". Choose any two from these three - "security", "functionality", "complexity".

For me that would be twice complexity, althought I would rather call it "not standard conform optimisation which occasionaly breaks the system and makes exesive use of CPU, RAM, hard-disk space and human recources" (TM, C, R &c.)

-jim

Happy Hacking,
Robert Himmelmann

Reply via email to