Re: Linux uncrackable...?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2012/09/08 17:19, Eddie G. O'Connor Jr. wrote:
On 09/03/2012 12:35 AM, jdow wrote:
On 2012/09/02 20:25, JD wrote:

On 09/02/2012 08:56 PM, Tim wrote:
On Sun, 2012-09-02 at 09:46 -0700, jdow wrote:
My take away from this is that absolutely nothing except a totally
disconnected machine in an impenetrable safe is uncrackable, even
Fedora machines. Some form of "AV" tool is called for as well as
routine checks with the various system check utilities. Even that
won't prevent 100% of all attempts from succeeding. But it will
help.
Nothing is 100% bulletproof, there will always be some weakness.  The
current state of play is to try an make sure that /that/ weakness
isn't exposed, rather than eliminate all the weaknesses (which isn't
really possible).

Yet, is it not amazing that with so many capable hackers in the world
poring over the open source software like Linux, looking for these
weaknesses have not publicized major weaknesses that could cripple it -
at least I have not been jolted by such news in a long time. It seems
that the sheer size of the source code all of the free open source
software packages that comprise an installation would be a powerful
enough reason to make most such hackers to grow quickly weary of such
endeavor (to expose weaknesses).

Cheers,

JD

Guys, consider something for a moment. There are CERT advisories against
Linux (and most anything else) from time to time. Now, how were these
discovered? Was it experts pouring over the code, was it somebody got
cracked, discovered it, and reported it, or was it somebody noticed some
odd packets and analyzed the vulnerability they were designed to exploit?
Only one of those cases involves a Linux machine that was not cracked. The
rest mean a vulnerability has been found one way or another and
subsequently exploited or at least attempted in the wild.

Deploying more than a minimalist defense gives you a better chance of not
owning the first few systems that get exploited before the hole is plugged.
Even if the chances are one in a million you'll face an exploit there if
every person in Los Angeles owned a Linux machine that means several people
in Los Angeles would suffer a bad case of computer flu.

I have a "thing" about people who say you don't need an AV or other defense
with Linux, "It's safe." That's been a mantra of the know nothings for
nearly 20 years now. I've disagreed with it for nearly 20 years now. So
when this juxtaposition of an attempted exploit coupled with an
advertisement on the site from which the attack took place touting Fedora
it sort of amused me leading me to share my amusement with the list.

(And, as noted, passwords are the easiest hole to exploit on Linux if the
person leaves an SSH port "too open to the world." Thank heavens for my
iptables defensive trick. Only two people have figured out how they can get
more than one shot at logging into my system. And those I found before
they'd had even 100 tries. I locked out their entire domain with a hard
lock instead of the soft lockout that happens automatically. And I STILL
worry. I am paranoid, perhaps. "They" certainly are out to get me. But it's
not personal. They are out to get anybody they can.)

{^_^}
So how would someone who's still a greenhorn to Linux protect their
machine?...I refuse to install anything that's going to "charge" me for their
 product....(call it a glitch in my mental processes, but if I'm going to use
 "Free Open Source Software" then it should be "free"...no?) I cannot get a
handle on ClamAV, it's too complicated for me, but I haven't seen anything
that's available for Linux....any advice?...


EGO II

rkhunter is one tool. chkrootkit is another. ClamAV is something that can
scan email and web browsing to catch threats that are not brand new.

Threats usually take enough time to spread that rapidly updating AV tools
like ClamAV can keep most people uninfected. The other two tools are
somewhat effective attempts to detect modifications to files or other
droppings that a rootkit or malware might leave lying around your system.
Their effective use depends on you keeping a good diary of changes you
make to your system.

{^_^}
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org


[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux