Is like comma 22:

- They hire you to use a console and you will be fired if you use a console!

I am italian, and for us, this kind of contradictions are normal ...

-----------------------------------------------------
Davide Rambaldi, PhD.
-----------------------------------------------------
IEO ~ MolMed
[e] davide.ramba...@ieo.eu
[e] davide.ramba...@gmail.com








On May 20, 2013, at 5:09 PM, Ben Bolker wrote:

> On 13-05-20 04:42 AM, Barry Rowlingson wrote:
>> On Sun, May 19, 2013 at 7:16 PM, Ben Bolker <bbol...@gmail.com> wrote:
>>> 
>>> The workstations have no access to external networks,
>>> nor to external media (thumb drives etc.) [information transfer to the
>>> outside world is via shared drives that can be accessed by
>>> administrators with network access].
>>> 
>>> * I stipulate that (1) the security policies don't make sense,
>> 
>> Correct. If the machines aren't on an external network and have no
>> removable media then this isn't about security from the outside
>> hacker, its about trust. The organisation does not trust YOU.
>> 
>> (2)
>>> allowing users access to arbitrary shell commands should _not_ represent
>>> a security risk on a well-administered, modern operating system (they're
>>> running WinXP),
>> 
>> When does WinXP go out of support? Even so, the PC isn't on the
>> network right? So what's the security issue? Doesn't make sense. You
>> can't stomp on other people's files. Would it matter if you could
>> accidentally see other people's files because they set permissions
>> loosely? How compartmentalised are the projects?
> 
>   That is indeed one of the major concerns.  The administrators could
> certainly lock the file access down more than they have (permissions are
> restricted, but I have information about the existence of lots of
> directories that I don't have permission to access: the system would
> probably be more secure if I couldn't even see the top level of these
> directories).
> 
>> (3) R probably offers many other avenues for system
>>> access to a malicious user, even in the absence of shell access,
>>> compilers, etc..
>> 
>> The 'malicious user' here is on the inside. The only way to get on
>> the machine is to be physically there? Then a malicious user can only
>> be a trusted user gone bad. A sufficiently malicious user with
>> hardware access can (nearly) always break the thing open and get at
>> the data (even if it comes down to reading data lines with a tap to
>> get at unencrypted streams). Tell the security guys they need to lock
>> the PCs up in a room and provide thin client access over a secure
>> private network at once. Enjoy your new Windows Client Access License
>> costs.
>> 
>> Glad I don't work for someone like that.
> 
>  For what it's worth, (1) the people I deal with directly are very
> nice, but not technically astute; the problem is more one of a large
> bureaucracy covering its ass in some nonsensical ways; (2) this is only
> a tiny component of my work.  If I get really frustrated with this I can
> just drop it.
> 
>  I agree with your analysis of the real security situation, more or
> less. (The PCs are pretty secure physically; it would be pretty hard to
> break into the boxes without being noticed ...), but I think this
> <http://xkcd.com/651/> is  a pretty good analogy for the kind of
> argument I could get into here.
> 
> ______________________________________________
> R-devel@r-project.org mailing list
> https://stat.ethz.ch/mailman/listinfo/r-devel


        [[alternative HTML version deleted]]

______________________________________________
R-devel@r-project.org mailing list
https://stat.ethz.ch/mailman/listinfo/r-devel

Reply via email to