brute force ssh attack
William Hooper
whooperhsd3 at earthlink.net
Thu Apr 28 18:08:53 UTC 2005
Matthew Miller wrote:
[snip]
>> So the "method of getting root privileges" is "regular users of their
>> own machines" running random executables (like the ones downloaded by a
>> script kiddie) as root.
>>
>> I'm interested in hearing how you would like to close this
>> vulnerability.
>
> In this case, some simple "don't do that" would have helped. But in the
> case of the sort of tricks that work on Windows users ("But the e-mail
> came from my friend!" "I wanted to see the funny animation it said was in
> there!") can work on Linux users too.
Only if you read your e-mail as root, which there is no reason to do.
> We need to *address* that, not just
> say "this is approximately zero threat". Obviously education is part of
> it. A more sophisticated SE Linux could be another.
A more sophisticated SELinux would require a more sophisticated user to
administer it. Catch-22.
--
William Hooper
More information about the users
mailing list