/etc/shutdown permissions

Jim Rosenberg jr at amanue.UUCP
Wed Nov 30 16:03:25 AEST 1988


In article <295 at jhunix.JHU.EDU> ins_anmy at jhunix.UUCP (Norman Yarvin) writes:
>In article <435 at amanue.UUCP> jr at amanue.UUCP (Jim Rosenberg) writes:
>
>>... Good security means defense in depth.
>
>To quote Mark Twain: "Put all your eggs in one basket, and WATCH THAT BASKET!"
>This is the usual Unix metaphor for security: rectrict yourself to one level of
>defense, but make that level completely airtight.  For instance, /etc/passwd
>is readable by the world.  This is highly reasonable, as _the_ line of defense
>against password reading is the encryption of passwords.  None other is needed.
>And the readability of the password file has the mental-attitude advantage that
>it focuses effort on the need for an uncrackable encryption algorithm.

I suggest you take this up with AT&T.  Please tell them that they were full of
horse puckey when they put shadow passwords into SVr3[.1?  Too bad on the 3b1
we'll never see Vr3.anything.]  If you think that the encryption algorithm of
/etc/passwd is safe you are living in dreamland.  In possession of /etc/passwd
an algorithm to guess passwords will succeed if someone has used all kinds of
categories of obvious passwords.  The recent Worm succeeded something like 5%
of the time just by guessing passwords!!  The encryption algorithm is *NOT*
"_the_" line of defense.  crypt + poorly chosen password + public password file
== no security.  This is one of the reasons why AT&T has **DONE AWAY WITH**
publicly readable passwords.  Just to take this one example, a proper approach
to password security includes the following layers:

1.  Proper people procedures.  (Do not write down your password next to your
terminal, do not share your password with your co-workers, etc.)

2.  Well-chosen passwords.  This is currently being beaten to death on the net
right now.

3.  Password encryption.

4.  o-r on the shadow password file.  (/etc/passwd has all the fields that
tools like ls need; the password field is there but not used.)

That's 4 layers.  Defense in depth means plan each layer as if it were all you
had, then hope at least one of them holds.  I think what you are suggesting
is an invitation to disaster.  I think defense in depth is just plain common
sense.  I will be most interested if you can site a literature reference
showing where the defense in depth concept just plain doesn't work.

Now I'm not an expert, but I have read some of the literature, & I know that
there are some pretty smart people who make a convincing case that some
security procedures are counter-productive.  I've read a reasonable argument
against too much su logging.  I don't know if I agree with it, but a case was
certainly made.  But saying that the defense in depth concept makes no sense is
like saying if you keep your brakes in good repair having a quick reaction time
on the brake pedal isn't necessary.

So, I still stand by defense in depth.  *SHOW ME* a break-in that happened
that points out a genuine flaw in the *concept*.
-- 
 Jim Rosenberg
     CIS: 71515,124                         decvax!idis! \
     WELL: jer                                   allegra! ---- pitt!amanue!jr
     BIX: jrosenberg                  uunet!cmcl2!cadre! /



More information about the Unix-pc.general mailing list