[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [cobalt-users] CGI Script Question



I am very much aware of network security policies and procedures since that
is the business I am in. What I was pointing out is that "admin" is a common
login on all raq products and in my opinion is a greater risk than with a
user that has limited permissions. Most of the users on this list have an
admin login and with the proper software and enough time their password can
be easily acquired and hacked into. Fortunately, for my company we have a
security officer with a staff that monitors our networks.

jimmy

-----Original Message-----
From: cobalt-users-admin@xxxxxxxxxxxxxxx
[mailto:cobalt-users-admin@xxxxxxxxxxxxxxx]On Behalf Of Steven Werby
Sent: Sunday, August 13, 2000 9:11 PM
To: cobalt-users@xxxxxxxxxxxxxxx
Subject: RE: [cobalt-users] CGI Script Question


On Sun, 13 Aug 2000, Jimmy Gross wrote:

> If that were true the the username admin is a security risk.

Above was in response to Zeffie:
> To me this is a security problem.  If I know the usernames on a unix box
> then I'm  half way in.  All I need to do is guess the passwd or automate
> it

Jimmy, Zeffie makes a good point.  Anything you can do to make it more
difficult for potentially malicious users to view and access critical and
sensitive files is probably a good idea.  As is anything you can do to
make it harder for hackers to gain access.

Creating usernames that do not match email address aliases and are
difficult to guess is an excellent idea.  I do so myself.  I never have to
worry about email sent to one user accidentally going to another b/c of a
conflict b/w a username on one site and an alias on another.  Plus, from
the username alone I know exactly what server and what site that user is
part of.  It also reduces the ability of a hacker to gain access by trying
to login using the left-hand side of an email address as a username since
that is never a username on my servers.

Cobalt servers have had known exploits from time to time also so making it
more difficult for a hacker to know you are running Cobalt servers can be
a good idea.  Every single Cobalt server I've telneted into except my own
has informed me that I was logging into a Cobalt server in the pre-login
prompt.  Using a browser to check for the existence of an /admin/,
/siteadmin/ and /personal/ directory will do the same.  As will entering a
URL with a bogus filename.  These are all things that are easily altered
in a few short minutes.  It's called security by obfuscation.

Of course, it's wise to proactively monitor log files for unusual
activity, run security software, run firewalls and do a number of other
things, but a lot of us don't have the time or knowledge to do so.  That's
understandable.  But making poor administrative decisions that can easily
be avoided at minimal effort on your part isn't very rational.

BTW, those of you wondering where you can make some quick changes should
study the following:

/etc/issue
/etc/httpd/conf/srm.conf

--
Steven Werby {steven-lists@xxxxxxxxxxxx}


_______________________________________________
cobalt-users mailing list
cobalt-users@xxxxxxxxxxxxxxx
To Subscribe or Unsubscribe, please go to:
http://list.cobalt.com/mailman/listinfo/cobalt-users