RE: Permit root login for telnet..

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>>logs into random boxes, erases critical data, drops a couple of
databases.

  So you may also know that whoever gets pissed off and does it -his/her
IT career is over as reference is everything in today's world.


We use ssh and all other security stuff here -this is just for
discussion. 

-----Original Message-----
From: redhat-list-bounces@xxxxxxxxxx
[mailto:redhat-list-bounces@xxxxxxxxxx] On Behalf Of Greg Golin
Sent: Wednesday, August 30, 2006 7:12 PM
To: General Red Hat Linux discussion list
Subject: Re: Permit root login for telnet..

Nice approach. Someone gets pissed off, sniffs out the passwords, logs
into random boxes, erases critical data, drops a couple of databases.
Then (if caught) they get fired. Your IT guys spend weeks restoring
date from backups, wondering what else might have been damaged.
Thousands of dollars in wages spent on rolling things back.
Because your "company policy" does not adhere to basic, --BASIC--
security practices that are FAR from novel, and are implemented in the
smallest shops.

G

On 8/30/06, Shekhar Dhotre <sdhotre@xxxxxxxxxxxx> wrote:
> >>>until someone broke
>
>  So there are unix guys who are better than Unix admins in your shop ?
> or was it programmer ?  You can easily trace that out -who logged in
by
> IP -DHCP etc.. we do it all the time ..
> If someone here even logs into co-workers machine without his
permission
> that's against company policy - HR disciplinary action - gets fired.
>
>
> -----Original Message-----
> From: redhat-list-bounces@xxxxxxxxxx
> [mailto:redhat-list-bounces@xxxxxxxxxx] On Behalf Of Bill Tangren
> Sent: Wednesday, August 30, 2006 5:27 PM
> To: General Red Hat Linux discussion list
> Subject: Re: Permit root login for telnet..
>
> Shekhar Dhotre wrote:
> > OK , no one has access to network room here than Coms guys . Even I
> > cannot go in as I am in Unix/Storages group. Our comm. guys are not
> > interested in checking our passwords.
> >
> > Also they have access to most of the prod switches, so they are
> trusted
> > by the business. Again not a risk .
> >
> >
>
> That's what some of us here thought too... until someone broke in to
one
> of our
> computers, put the network card in promiscuous mode, started a
password
> sniffer,
> and then got the root passwords for dozens of boxes.
>
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux