Re: Another Fedora decision

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Thu, February 5, 2015 5:23 pm, Always Learning wrote:
>
> On Thu, 2015-02-05 at 16:39 -0600, Valeri Galtsev wrote:
>
>> >>>
>> >>>       -rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow
>
>> Be it me, I would consider box compromised. All done on/from that box
>> since probable day it happened compromised as well. If there is no way
>> to
>> establish the day, then since that system originally build. With full
>> blown sweeping up the consequences. Finding really-really-really
>> convincing proof it is not a result of compromise (and yes, fight one's
>> wishful thinking!).
>
> Logically ?
>
> 1. to change the permissions on shadow from -rw-x------ or from
> ---------- to -rw-r--r-- requires root permissions ?
>
> 2. if so, then what is the advantage of changing those permissions when
> the entity possessing root authority can already read shadow - that
> entity requires neither group nor user permissions to read shadow.
>

As I said, it's your money, mister.

Think of what your users will think about your response to bizarre you
have discovered. Sysadmins have their users' trust a priori. But they have
to keep deserving this trust all the time.

Just my $0.02

Valeri

PS I figure I really have to thank my teachers! Including great books I've
read...

++++++++++++++++++++++++++++++++++++++++
Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247
++++++++++++++++++++++++++++++++++++++++
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux