security

Robert J. Granvin rjg at sialis.mn.org
Tue Jun 6 22:28:48 AEST 1989


>True, but many of the UNIXpc security holes are specific to the UNIXpc.
>It requires a good level of knowledge to exploit them. Not that they
>are hard, but most users would require some time to find them due to
>an unfamiliarity with the machine. On the other hand, having a root 
>directory that is 777 is asking to be broken an would be a standard 
>thing to check for on ANY Unix box.

A fair level of knowledge really.  Not necessarily a good level. 

Today, you can be fairly certain that if a person has a personal
machine on the net, that it's more than likely some sort of Unix/Xenix
PC type box, or a 3b1/7300.  Map distributions notoriously describe
the machine you are using, in significant detail.  You can also guess
what type of system a person has by what newsgroups that person is
active in.

Other 3b1 utilities make it easier for a security breach as well,
without having to go through much difficulties.  Have you passworded
your "install" login?  Even someone who is completely scared off by
'root' can work around 'install' quite easily.

I once watched someone diligently attempt to break into my machine via
install... Oh, pity the wasted time of the poor fool... :-)

It is a mistake to assume that a security breach will immediately come
from a direct route.

-- 
________Robert J. Granvin________   INTERNET: rjg at sialis.mn.org
____National Computer Systems____   CONFUSED: rjg%sialis.mn.org at shamash.cdc.com
__National Information Services__       UUCP: ...uunet!rosevax!sialis!rjg
                 "Exxon: Our gasoline contains no sea water"



More information about the Unix-pc.general mailing list