[opensuse] Security
Hi. I intent make a new server, with a security trigger If anybody try make a login with root or other user and dont use a corrent password . this triger erase a home of this user and if try to login as root this triger erase all file system Any body have inf how I cand do it ? thanks Jose Finger -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org
On Wednesday 03 January 2007 08:04, Jose wrote:
Hi. I intent make a new server, with a security trigger If anybody try make a login with root or other user and dont use a corrent password . this triger erase a home of this user
What is served by this? All I (as a putative bad guy) need to do to erase a user's files is find out their login name and attempt to log in with a bad password.
and if try to login as root this triger erase all file system
Root's home directory is, by default, "/root", not "/".
Any body have inf how I cand do it ?
My recommendation would be: Don't!
thanks Jose Finger
Randall Schulz -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org
Jose escribió:
Hi. I intent make a new server, with a security trigger If anybody try make a login with root or other user and dont use a corrent password . this triger erase a home of this user and if try to login as root this triger erase all file system Any body have inf how I cand do it ? thanks
Very silly policy, will give you no security and only cause trouble. please, don't, and try to understand what security is all about.
Jose wrote:
Hi. Hi,
I intent make a new server, with a security trigger If anybody try make a login with root or other user and dont use a corrent password . this triger erase a home of this user and if try to login as root this triger erase all file system The way I undestand your question is so:
Your company has a few people who are allowed to log into the server to see the confidential information. For this example let us say that only User A and User B are allowed to see the confidential documents. User C is also allowed to log into the server but is not allowed to view the confidential documents. User C now tries to see the confidential documents by using the username and what he thinks User A' password is ie he wants to login as though he was User A. User C however does not know User A; correct password and so your security trigger deletes all of User A' /home directory. Doing this would require you to restore User A' /home directory from your backup before User A logged into the system again. Before you have managed to restore User A' /home directory User C decides to try and access the confidential documents again using what he thinks is the correct root password. The login fails and as a result of your security trigger, / is deleted requiring you to completely rebuild and restore everything on the server. I might not be reading this correctly but if you manage to do what I read from your post, it would result in you having to almost continually restore from backups and rebuild the nmachine, as the number of logins that use the incorrect password, as you said earlier, is high. My suggestion would be to either implement two factor authentication system so that the incorrect person has no way of having both/knowing both of the security checks OR to learn how to use the Linux filesystem ownership so that only certain users will have access to those confidential files. One last suggestion would be to somehow send you an alert of which PC had the failed login attempt and then ask that person why they are trying to acess confidential documents and possibly threaten them with the loss of their job if it happens again. For more information I suggest you search for a list in your home language about security. You can try and join security-basics@securityfocus.com HTH -- ======================================================================== Using SuSE 9.2 Professional with KDE and Mozilla Mail 1.7.13 Linux user # 229959 at http://counter.li.org ======================================================================== -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org
Hylton Conacher(ZR1HPC) wrote:
User C now tries to see the confidential documents by using the username and what he thinks User A' password is ie he wants to login as though he was User A.
If I was user C, I wouldn't try to log in. I'd just steal the backup. Or the hard disk of the server. If the data really is important: (1) encrypt all the data, including the backups (2) physically secure the hardware - lock it all in a strong windowless interior room (lock the backups in a vault somewhere else) (3) only permit login attempts by authenticated people, preferably authenticated by another person (e.g. only permit login attempts from a terminal within the locked room, accompanied by a security guard) For anything more complex, *don't* read the books - hire a security consultant who knows the pitfalls. Cheers, Dave -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org
participants (5)
-
Cristian Rodriguez R.
-
Dave Howorth
-
Hylton Conacher(ZR1HPC)
-
Jose
-
Randall R Schulz