At 12:25 PM 6/2/01, Mark Delany wrote:
>On Sat, Jun 02, 2001 at 05:20:01PM +0200, Boris allegedly wrote:
> > Well, there is no button with a text like "press me here" -))))) 
> for
> > the public.
>
>Of course there is, silly.
>
>Now, what do you think most script kiddies do? They don't scour the
>code for exploits as you imply with "there is no button". They simply
>download the hard work of one or two people and install the pre-built
>button. It's trivial. So, "press me here" is as far away as a
>download. You're not seriously suggesting this is a serious secruity
>barrier are you?

This is a very, very good point.  We have unfortunately reached a stage 
where the crackers don't need to actually _know_ anything 
anymore.  They download a port scanner and a root kit, and can 
compromise your machine without having any real understanding of what's 
going on.

You not only have to protect yourself from the skilled, determined 
cracker, but also from the unskilled, casual cracker.   The former is 
far more difficult than the latter, but fortunately the really talented 
black hats have better things to do than hit 99% of the machines out 
there.

We had a machine compromised by an exploit in the wu-ftpd package a 
couple of years ago.  Fortunately, I happened to be on the machine when 
it occurred, and was able to monitor the cracker's activities and shut 
him down before he was able to cause any real damage.

Based upon the things he typed, he had no idea what he was doing:

         cd /etc/init.
         cd /etc/init.d
         ls
         cd etc
         ls
         ls init*
         ls rc*
         cd rc.local
         ls
         ls -al rc.*
         cd init.d

And yet, in the space of 5-10 minutes, he was able to break in and 
install three trojans.

Sendmail can be secure, if you really know what you're doing and stay 
on top of the patches that come out (every three days or so).  I don't 
have that kind of time, so I'd rather have a mail server that is secure 
out of the box.  We've been gradually migrating our domains from 
sendmail to qmail over the last ~year; I've had to patch sendmail at 
least twice, qmail hasn't needed anything since install.

I can deal with (sometimes) sketchy documentation and the hassle of 
installing 12 different things to get the results I want -  that's 
still easier than restoring a machine that's been compromised.

Todd



Reply via email to