|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T g
Length: 1372 (0x55c)
Types: TextFile
Names: »guest-accounts.tex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z«
└─⟦5c5f5f2d8⟧
└─⟦this⟧ »guest-accounts.tex«
\section{Guest Accounts}
The computer center guest policy is among the most hotly debated
topics at many computer centers. From a security standpoint, it
should be obvious that an attacker who has access to a guest account
can break into a computer facility more easily.
\subsection{Attack Difficulty Ratios}
Basically it is a factor of ten easier to break into a machine where
you can easily get as far as a login prompt that one where you can't.
Being able to reach the machine through a standard networking
discipline and open connections to the daemons is worth another order
of magnitude. Access to a machine that is run by the same group is
worth another factor of three and access to a machine on the same LAN
would grant a factor of three beyond that. Having a guest account on
the target machine makes the attack still another order of magnitude
easier.
Essentially, having a guest account on the target simplifies an attack
at least a thousand fold from having to start cold.
\subsection{Individual Sponsors}
I strongly suggest requiring each guest to have an individual staff
sponsor who takes responsibility for the actions of his guest.
\subsection{The No Guest Policy}
In centers that prohibit guests, staff members often share their
passwords with their guests. Since these are generally privileged
accounts, this is a significant danger.