[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[no subject]
Your examples (spam relay, zombie) don't require root, what do you think
needs root to launch an attack? Again, these are 20 year old
arguments that apply to servers (for hacking websites, dns, email) that
have zero bearing on desktop PCs.
> I suppose, from a purely selfish point of view, it makes no difference.
> Unless you're held accountable for actions an attacker takes using your
> compromised computer.
That assumes that you can come up with something malicious that needs
root rather than a non-root account. What action does an attacker need
root for that I could be held accountable (presumably to others) for?
> >
> > > Unless you're going to spend the time with a fine-tooth comb
> > > to audit every piece of software that you run,
> >
> > No need to audit software that you trust. The fine tooth comb is needed
> > to set EVERYTHING up for a normal user to have access to gratuitous
> > system resources needed by everyday apps (iPODs, dvd burners, video
> > games, advanced sound card features (midi, etc).
>
> It's really not that big a deal to add your user account to the dvd,
> video, audio, games, etc. groups.
BINGO. That was my original entry into this thread. I can configure a
thousand things (thereby giving my user account god-like access) or I
can just "useradd jimpop -u 0". There really isn't much difference on a
desktop single-user PC/laptop.
> >
> > > there's no rationale for running as root.
> >
> > Sure there is. You may not see it however.
>
> It's the same old argument that always comes up: security vs.
> convenience. Like many things, it's more convenient to run as root, but
> less secure.
HOW IS IT LESS SECURE??? Less secure for who? The User? LOL! Running
as a user is just as insecure for that user.
> > What's the difference between "sudo mkfs /dev/hda8" and runing
> > "mkfs /dev/hda8" as root?
>
> The first requires an extra step. If a trojan script has "mkfs
> /dev/hda8" in it, and you execute it as root, you just lost your
> filesystem. If you execute it as a normal user you're safe. That is,
> admittedly, a contrived example, but the principle still holds.
First off, it is too easy to have a malicious virus try both ways (mkfs
vs sudo mkfs). In fact, I bet it can be done in a one line perl script
to format all available partitions. HOWEVER, the other argument being
given is that running as root allows a zombies to magically infect your
machine. Isn't mkfs the best thing for a zombie infected machine? :-)
-Jim P.
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<ul><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><a name="00432" href="msg00432.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> jasonday at worldnet.att.net (Jason Day)</li></ul></li>
</ul></li></ul>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00313" href="msg00313.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> meson3902 at gmail.com (Mark Schill)</li></ul></li>
<li><strong><a name="00346" href="msg00346.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> james.sumners at gmail.com (James Sumners)</li></ul></li>
<li><strong><a name="00348" href="msg00348.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> jsheets at yahoo.com (Jerald Sheets)</li></ul></li>
<li><strong><a name="00350" href="msg00350.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> groups at ChangingLINKS.com (ChangingLINKS.com)</li></ul></li>
<li><strong><a name="00351" href="msg00351.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> Robert.L.Harris at rdlg.net (Robert L. Harris)</li></ul></li>
<li><strong><a name="00359" href="msg00359.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> jimpop at yahoo.com (Jim Popovitch)</li></ul></li>
<li><strong><a name="00361" href="msg00361.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> kafka at antichri.st (George Carless)</li></ul></li>
<li><strong><a name="00368" href="msg00368.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> jimpop at yahoo.com (Jim Popovitch)</li></ul></li>
<li><strong><a name="00394" href="msg00394.html">[ale] Linux Distributions</a></strong>
<ul><li><em>From:</em> jasonday at worldnet.att.net (Jason Day)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg00415.html">[ale] Linux Distributions</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg00417.html">[ale] Linux Distributions</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00394.html">[ale] Linux Distributions</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg00432.html">[ale] Linux Distributions</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#00416"><strong>Date</strong></a></li>
<li><a href="threads.html#00416"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>