Jesse P Schultz on Tue, 2 Jul 2002 21:31:56 -0400 |
gabriel rosenkoetter wrote: On Mon, Jul 01, 2002 at 10:25:19AM -0400, Jesse P Schultz wrote: When I use the term in the clear I mean unencrypted. SSH is not in the clear. Telnet is in the clear. Unless of course you are telneting through something like an ipsec VPN. It does not matter whether you initially log in as root or su, if it's encrypted (SSH) it's encrypted, if it's not (Telnet) it's not, and using su only makes it difficult for a hacker who is not trying very hard. MITM is , of course a possibility on an encrypted connection and digital certificates will help with that. Bad practice not for security from a hacker but from security from yourself. If you log in as root it is easy to forget you are root and not use the care you should. The reason that logging in to the root account using PKI is more secure than logging into your regular account (however) and then using su(1) (or sudo, for that matter, which should be considered a usage convenience and NEVER a security measure) is that the no shared secret is ever sent across the wire. This makes a mitm attack totally impossible, provided there's not feasible attack on the PKI protocol in use. I never said su was a security measure, but I think of it as more of a precaution (against my own stupidity) than a conveniance. Kind of like, okay now, I am becoming root, I need to be careful. This is not a real beg deal on My own systems, but if I am working on someone elses server and they have a vital business reason not to want down time on a web/email/ftp/whatever system I always go to root with great trepidation. The act of doing an su helps makes it a solemn act. In the real world, there certainly exist plausible attacks against either DSA or RSA SSH-2 authentication, but these attacks take a significantly longer time to brute force than user passwords.
Is there an actual need to use what is normally considered bad practice?
One should only use root when doing root stuff. Making a habit of logging in as a regular user then changing to rot is a venerable best practice for admins ______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug
|
|