From: Ray Olszewski <ray@comarre.com>
To: linux-newbie@vger.kernel.org
Subject: Re: root password
Date: Fri, 01 Apr 2005 10:23:56 -0800 [thread overview]
Message-ID: <5.1.0.14.1.20050401095907.01f50b78@celine> (raw)
In-Reply-To: <200504011055.44030.eric@cisu.net>
At 10:55 AM 4/1/2005 -0600, Eric Bambach wrote:
>On Wednesday 30 March 2005 08:36 am, Ray Olszewski wrote:
> > Any other suggestion of how to become root without knowing the root
> > password is a technique for breaking into systems, and I (and I hope
> > everyone else) will not give advice on that publicly, in this forum or
> > anywhere else.
>
>I respectfully disagree. How will sysadmins ever know how to secure their
>systems unless they know HOW break-ins occur. Certainly most hacking doesnt
>come from boot CDs but having a more informed sysadmin is infinitely better
>than one that only discovers how to make their system more secure *AFTER*
>being broken into.
>
>What you are saying is that security through obscurity is good and there have
>been countless rebuttals on just how horrible security though obscurity is in
>99% of the situations. The only reason for S.T.O. is a company that found an
>exploit and is giving lead-time to the vendor to patch their vulnerable
>software.
I wasn't quite saying that, and I apologize if my abbreviated presentation
led you down that path. My reluctance was specific to this context, in
which someone was asking not how to secure a system, but how to become root
without knowing the root password. That it was his own system he wanted to
break into certainly is relevant, but, on a public list, it is not the only
consideration.
I do believe that sysadmins need to know how to secure thair systems. There
are plenty of sites on the Internet, and books and articles in print, that
offer this sort of help. And one can learn how to secure systems without
receiving detailed tutorials in how to exploit common holes (buffer
overflows, overprivileged daemons, weak passwords, and so on).
But I also believe that giving step-by-step instructions for how to break
into systems, on a list intended for beginners, is not the best way to make
this information public. That sort of help is a bit more than fighting
"security through obscurity" by identifying vulnerabilities, in my opinion
... it amounts to tutoring crackers, something I personally do not care to
do. Particularly in the context of the actual question, which involved a
system that the poster (presumably) had physical access to, so could retake
control of with a rescue disk.
If you (and Tobias, and anyone else) feel differently, then you should act
on your beliefs and provide this sort of information on request, I suppose.
So I do apologize for the suggestion that my personal view here should
restrict what you and others do. Please feel free to provide any
information of this sort that you have, and be sure I will not criticize
you for doing so.
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs
next prev parent reply other threads:[~2005-04-01 18:23 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-03-30 7:16 root password Ankit Jain
2005-03-30 14:36 ` Ray Olszewski
2005-04-01 16:23 ` Tobias Hirning
2005-04-01 16:52 ` Eric Bambach
2005-04-01 18:03 ` Tobias Hirning
2005-04-02 18:53 ` Ray Olszewski
2005-04-02 19:11 ` Tobias Hirning
2005-04-01 16:55 ` Eric Bambach
2005-04-01 18:23 ` Ray Olszewski [this message]
2005-04-01 23:57 ` J.
2005-04-02 0:56 ` Peter
[not found] ` <16974.37459.930871.583279@gargle.gargle.HOWL>
2005-04-03 3:04 ` Re[2]: root password *reset root password with grub* Kev
2005-04-03 3:53 ` joy merwin monteiro
2005-04-04 3:39 ` Glynn Clements
-- strict thread matches above, loose matches on Subject: below --
2005-04-03 4:39 root password Ankit Jain
2005-04-03 5:05 ` Jim C. Brown
2005-04-03 5:14 ` Grant Coady
2005-04-04 2:48 ` Glynn Clements
2005-04-04 11:42 ` Andrew
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5.1.0.14.1.20050401095907.01f50b78@celine \
--to=ray@comarre.com \
--cc=linux-newbie@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox