Protecting against downloads

John G. DeArmond jgd at rsiatl.UUCP
Thu Sep 13 14:10:05 AEST 1990


heiser at sud509.ed.ray.com (Bill Heiser - Unix Sys Admin) writes:


>A *ix sysop I communite with recently told me that he'd caught one of
>his "shell-access" users downloading *ix binaries.  

>As far as I can see, we either have to trust the users that we give     
                                ^^^^^^^^^^^^^^^ 
>shell access to, or make kermit/sz, etc unavailable to them.   


The answer is in your post.  We have none of that problem here. 
Of  course, we choose our users fairly carefully and have in
place a first-offense-termination rule.   Even if you you
removed all file transfer programs and the development tools,
it would only take an experienced Unix programmer a little while
to hack together an elementary transfer program using awk, sed,
ed or any of a number of other tools.  Technology will never
solve problems of inferior ethics. 

A method of self-policing in regards to the quality of articles 
posted from this site might work for you.  We have a pretty liberal
posting policy and rely primarily on peer pressure for quality
control.  One mechanism is that we have a local newsgroup, rsi.postings,
that receives a copy of all locally posted articles.  The knowledge
that everybody on the system sees all posts regardless of the original
newsgroup is sufficient peer pressure that we've never had a problem.

You could probably do something similiar by hacking the source to sz
and kermit to post the name of the user and the name of the file transfered
to a local newsgroup. 

One other thing we have is a custom-written getty that logs all keystrokes
received during the login process to an external device via a physically
one-way path.  This is designed to alert us to users who would play around
with password guessing and/or crackers who try the system.  We make the
existence of this system very public which serves as a deterrent.

I firmly believe that if one removes the barriers to a system that represent
challenges, the incentive to misbehave is removed for most people.  And you
simply eliminate the small subset that do misbehave.

If you really wanted to try a technology solution, one would be to
carefully restrict the permissions on binaries to execute-only.
I say "carefully" because you may break a number of scripts that
rely on being able to test the readability of files to verify
their existence.

John

-- 
John De Armond, WD4OQC  | We can no more blame our loss of freedom on congress
Radiation Systems, Inc. | than we can prostitution on pimps.  Both simply
Atlanta, Ga             | provide broker services for their customers.
{emory,uunet}!rsiatl!jgd|  - Dr. W Williams |                **I am the NRA**  



More information about the Comp.unix.sysv386 mailing list