Mailing List Archive
tlug.jp Mailing List tlug archive tlug Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] on root logins (1)
- Date: Thu, 29 Dec 2005 05:13:29 -0800
- From: Uva Coder <uva.coder@example.com>
- Subject: Re: [tlug] on root logins (1)
- References: <ea4e853e0512241908t260aeadbv4115aaf74a358e64@example.com> <43AFAED3.9080809@example.com> <87fyofyhv2.fsf@example.com> <87bqz1wzs9.fsf_-_@example.com> <7e92f16c0512272310vb2c803dncfb7141f38f3921c@example.com> <32a656c20512280425p20687c76td183695fbbe21162@example.com> <1135773703.5260.74.camel@example.com> <32938.221.83.45.6.1135776321.squirrel@example.com> <32a656c20512281224y4cce0990s744eed9ba669e6e1@example.com> <1135835906.31564.28.camel@example.com>
On 12/28/05, Michael Reinsch <mr@example.com> wrote: > > But actually my statement was a bit broader. There are more mistakes you > can make which can compromise the security of the system or the user's > privacy than simply wipe the system. One advantage of those "wiping the > system" type of mistakes is also that they are obvious... not all > mistakes are this obvious. > > So I'm still not convinced that giving an administrator more rights in a > general way as you described (adding his user to the sys group *1) is a > good idea. In my opinion, an administrator should be required to > deliberately switch to a status with more rights (*2) for a certain > task, instead of having those rights all the time. I agree. Don't use the sys user all the time. And the other extreme of limiting users can be done through control of groups as I see it. <digress> Plan 9 has come a long way toward the idea of defining the environment, then give the regular users the userland. For the security conscious, I recommend reading http://plan9.bell-labs.com/sys/doc/auth.html Here's an excerpt for the lazy: "The security architecture of the Plan 9 operating system [Pike95] has recently been redesigned to make it both more secure and easier to use. By security we mean three things: first, the business of authenticating users and services; second, the safe handling, deployment, and use of keys and other secret information; and third, the use of encryption and integrity checks to safeguard communications from prying eyes." </digress>
- References:
- [tlug] Kubuntu v5.10
- From: Lyle H Saxon
- Re: [tlug] Kubuntu v5.10
- From: Robert C Balfour
- Re: [tlug] Kubuntu v5.10
- From: Stephen J. Turnbull
- [tlug] on root logins (1)
- From: Stephen J. Turnbull
- Re: [tlug] on root logins (1)
- From: Stoyan Zhekov
- Re: [tlug] on root logins (1)
- From: Uva Coder
- Re: [tlug] on root logins (1)
- From: Michael Reinsch
- Re: [tlug] on root logins (1)
- From: Micheal E Cooper
- Re: [tlug] on root logins (1)
- From: Uva Coder
- Re: [tlug] on root logins (1)
- From: Michael Reinsch
Home | Main Index | Thread Index
- Prev by Date: Re: [tlug] on root logins (1)
- Next by Date: Re: [tlug] Some advices for Zaurus
- Previous by thread: Re: [tlug] on root logins (1)
- Next by thread: Re: [tlug] on root logins (1)
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links