Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: tlug: telnet: different question + others
- To: tlug@example.com
- Subject: Re: tlug: telnet: different question + others
- From: "Thomas O'Dowd" <tom@example.com>
- Date: Tue, 30 May 2000 00:17:17 +0900
- Content-Type: text/plain; charset=us-ascii
- In-Reply-To: <14642.27395.611137.83150@example.com>; from turnbull@example.com on Mon, May 29, 2000 at 10:05:07PM +0900
- References: <20000529101400.B7207@example.com> <Pine.LNX.4.10.10005290525160.31060-100000@example.com> <20000529132313.B277@example.com> <14642.4422.675111.887914@example.com> <20000529171430.A8484@example.com> <14642.19581.689154.716136@example.com> <20000529211108.B6592@example.com> <14642.27395.611137.83150@example.com>
- Reply-To: tlug@example.com
- Sender: owner-tlug
Interesting drinking material me thinks... On Mon, May 29, 2000 at 10:05:07PM +0900, Stephen J. Turnbull wrote: > >>>>> "Thomas" == Thomas O'Dowd <tom@example.com> writes: > > Thomas> All in the spirit of education... I think the post got so > Thomas> many responses because it was an interesting technical > Thomas> question about how to do something on a linix box. There > Thomas> was nothing malicious in any of the responses apart from > > No, not malicious. Just unthinking. If you don't understand and > describe the security implications, then you may very well be doing > someone, possibly even the perpetrator, a severe disservice. I agree with you here, but I still think it was an interesting problem and would answer it the same way again and still make the same point that I made at the end of my mail that he really should be attending class... > Thomas> the side effect that if they were successful it might lead > Thomas> to the attendance records going out of sync with reality. > > False. Some of the suggestions involved clear security breaches > (.rhosts, ssh access without passphrase on a semi-public terminal) > that could possibly be more broadly exploited. (At the very least, an > intruder with the intent to break the real security on the University > net could almost surely exploit that script to mask their identity. > Remember, on a public access box everyone is root, there's no good way > to be sure that any file on it is secure.) Letting any user login at all always opens up the possibility of this. The best you can do is educate your users aswell as shutdown your system's security and maintain a watchful eye on what's running on your system. If a site choses to run .rhosts then at least they should be scanned for the existance of the dreaded + and such lines removed, with an educational email to the offending user. It is up to the site to try and provide the security they need and the education to go with it. For example, they had a policy at my old college whereby the system imposed a limit on how long a process could run after which time it was terminated. It didn't take long to figure out, that your program could just set an alarm just before this timeout, fork and let the parent process die to get around this. Another one was where they didn't allow print jobs above a certain size to get spooled. Another smart guy figured this one out and pretty soon everyone was running an lpr script to split big files into multiple print jobs. The point is that creative people love to solve these problems and the SAs had better be smart to stay ahead. As long as it's friendly fire, then I don't see a problem as both sides get to learn a lot from each other. All said, if the lecturer is "smart" enough to take the lazy option of taking attendance with the "w" command, then a student can be smart enough to fake attendance with the "w" command. Cheers, Tom. -- Thomas O'Dowd tom@example.com -------------------------------------------------------------------- Next Nomikai Meeting: June 16 (Fri), 19:00 Tengu TokyoEkiMae Next Technical Meeting: July 8 (Sat) 13:30 Topic: TBA -------------------------------------------------------------------- more info: http://www.tlug.gr.jp Sponsor: Global Online Japan
- Follow-Ups:
- Re: tlug: telnet: different question + others
- From: "Stephen J. Turnbull" <turnbull@example.com>
- References:
- Re: tlug: telnet: different question + others
- From: Frank Bennett <bennett@example.com>
- Re: tlug: telnet: different question + others
- From: Philip Mak <pmak@example.com>
- Re: tlug: telnet: different question + others
- From: Chris Sekiya <sekiya@example.com>
- Re: tlug: telnet: different question + others
- From: "Stephen J. Turnbull" <turnbull@example.com>
- Re: tlug: telnet: different question + others
- From: Frank Bennett <bennett@example.com>
- Re: tlug: telnet: different question + others
- From: "Stephen J. Turnbull" <turnbull@example.com>
- Re: tlug: telnet: different question + others
- From: "Thomas O'Dowd" <tom@example.com>
- Re: tlug: telnet: different question + others
- From: "Stephen J. Turnbull" <turnbull@example.com>
Home | Main Index | Thread Index
- Prev by Date: tlug: Re: telnet: different question + others
- Next by Date: tlug: Fighting with realplayer
- Prev by thread: Re: tlug: telnet: different question + others
- Next by thread: Re: tlug: telnet: different question + others
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links