LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Closed Thread
  Search this Thread
Old 08-28-2012, 09:45 AM   #451
jtsn
Member
 
Registered: Sep 2011
Posts: 922

Rep: Reputation: 480Reputation: 480Reputation: 480Reputation: 480Reputation: 480

Security by obscurity never works.
 
1 members found this post helpful.
Old 08-28-2012, 10:03 AM   #452
brianL
LQ 5k Club
 
Registered: Jan 2006
Location: Oldham, Lancs, England
Distribution: Slackware64 15; SlackwareARM-current (aarch64); Debian 12
Posts: 8,299
Blog Entries: 61

Rep: Reputation: Disabled
Quote:
Originally Posted by Mercury305 View Post
talk to you guys later i gotta study.
I'm sure I heard a collective sigh of relief when you left.
 
Old 08-28-2012, 10:06 AM   #453
Alien Bob
Slackware Contributor
 
Registered: Sep 2005
Location: Eindhoven, The Netherlands
Distribution: Slackware
Posts: 8,559

Rep: Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106Reputation: 8106
Quote:
Originally Posted by Mercury305 View Post
Are you serious...? No comment. You are missing the point here.

But let me be nice and add: So you got hacked system logs manipulated... now what? who did? how? what? when? where?...

talk to you guys later i gotta study.
Do you really think you can trust your logs after a hack & break-in? Even with tagged and signed logs, the hacker will either use his hacker tools to violate your records or will just delete all logs and therefore will leave you out in the cold.
Do not underestimate the criminal hacker scene. That is a hidden IT industry turning around many millions of dollars a year, which produces tools which are as good or better than any white-hat forensics tools.

Quote:
Originally Posted by jtsn View Post
Security by obscurity never works.
Exactly.
 
Old 08-28-2012, 10:13 AM   #454
Mercury305
Member
 
Registered: Jul 2012
Location: Rockville, MD
Distribution: CrunchBang / Ubuntu
Posts: 540

Rep: Reputation: Disabled
Quote:
Originally Posted by Alien Bob View Post
Do you really think you can trust your logs after a hack & break-in? Even with tagged and signed logs, the hacker will either use his hacker tools to violate your records or will just delete all logs and therefore will leave you out in the cold.
Do not underestimate the criminal hacker scene. That is a hidden IT industry turning around many millions of dollars a year, which produces tools which are as good or better than any white-hat forensics tools.



Exactly.
I am not underestimating. But encrypting log files makes lots of sense to slow them down... Hey then why use /etc/shadow? The hacker will decrypt it anyways right? lets just give up on security since everything is insecure and not worry about encryption from now on. Hackers can crack it anyway...
I'm not trying to sound condescending but this is the logic of what you are saying. If he decides to delete them... then you don't think the admin will notice?
There is no way to justify this imo.

Last edited by Mercury305; 08-28-2012 at 10:14 AM.
 
Old 08-28-2012, 10:34 AM   #455
jtsn
Member
 
Registered: Sep 2011
Posts: 922

Rep: Reputation: 480Reputation: 480Reputation: 480Reputation: 480Reputation: 480
Obfuscating a logging facility actually makes it easer to cover tracks. It's not about deleting logs, its about hiding activities. A whole malware industry lives off the fact, that Windows is opaque, mostly undocumented and has its configuration and logs stored in BLOBs. The only people that really know this stuff in-depth (including knowledge gained by reverse engineering) are the black hats.

You can be sure, that within weeks your rootkit programmer next door knows more about systemd/journald and its undocumented features than your regular sysadmin, who can't even tell, if the output of the fancy frontend tool has anything to do with the real content of the "journal".
 
1 members found this post helpful.
Old 08-28-2012, 10:34 AM   #456
gnashley
Amigo developer
 
Registered: Dec 2003
Location: Germany
Distribution: Slackware
Posts: 4,928

Rep: Reputation: 612Reputation: 612Reputation: 612Reputation: 612Reputation: 612Reputation: 612
I'll just simply ignore systemd until it goes away -I have already done just that with other such things. Even udev itself could go that way. I won't be too worried until something like this shows up in the kernel:

Code:
--- ./main.c.00	2008-10-10 00:13:53.000000000 +0200
+++ ./main.c	2012-08-28 17:48:25.000000000 +0200
@@ -825,7 +825,7 @@
 		printk(KERN_WARNING "Failed to execute %s.  Attempting "
 					"defaults...\n", execute_command);
 	}
-	run_init_process("/sbin/init");
+	run_init_process("/usr/bin/systemd");
 	run_init_process("/etc/init");
 	run_init_process("/bin/init");
 	run_init_process("/bin/sh");
 
2 members found this post helpful.
Old 08-28-2012, 10:39 AM   #457
abrouwers
Member
 
Registered: May 2005
Location: Michigan
Distribution: Slackware -current
Posts: 98

Rep: Reputation: 37
Since there seems to be a misconception about it, I'll kindly point out that using systemd's journal is *not* required. You can simply ignore the journal all together, and the data it stores ( sitting in /run by default ) will sit and consume little to no space (10mb max by default, iirc? and configurable), and be wiped away at boot.

syslogging continues to work exactly how it does today. Again, projects like rsyslog even go so far as to provide native systemd files. Of course, in large scale operations which depend on heavy log monitoring, the standard system logger will never go away. And it's not the intention of systemd to ever do so.

Personally? I agree that the binary log format is a little strange. But as a single-user on my laptop, the journal has completely made a system logger obsolete. I can ask systemd about a service, and it tells me the state of the the service, and even pops up the last few entries regarding that service that the journal has seen. It's really, really neat in practice.

Again, it's all about choice. systemd has really cool stuff built in which caters a little easier to the standard user, but in the event you want the kitchen-sink solution, it works just as well.
 
Old 08-28-2012, 10:44 AM   #458
Mercury305
Member
 
Registered: Jul 2012
Location: Rockville, MD
Distribution: CrunchBang / Ubuntu
Posts: 540

Rep: Reputation: Disabled
Quote:
Originally Posted by jtsn View Post
Obfuscating a logging facility actually makes it easer to cover tracks. It's not about deleting logs, its about hiding activities. A whole malware industry lives off the fact, that Windows is opaque, mostly undocumented and has its configuration and logs stored in BLOBs. The only people that really know this stuff in-depth (including knowledge gained by reverse engineering) are the black hats.

You can be sure, that within weeks your rootkit programmer next door knows more about systemd/journald and its undocumented features than your regular sysadmin, who can't even tell, if the output of the fancy frontend tool has anything to do with the real content of the "journal".
Please someone decypher this for me. I can't seem to understand the reasoning of what you are trying to say.

Leaving the log files as text simply cp a snapshot of logs then to upload new one makes great sense for a hacker. The admin can just log on and walla! Nothing happened in my logs, my system is secure carry on... (admin)

Oh now you are going to say the dates? and time file is created?

So hackers can hack the systemd encryption and all the added security features but can't manipulate dates to files?

You are talking to an exhacker here.
 
Old 08-28-2012, 10:46 AM   #459
Mercury305
Member
 
Registered: Jul 2012
Location: Rockville, MD
Distribution: CrunchBang / Ubuntu
Posts: 540

Rep: Reputation: Disabled
Quote:
Originally Posted by abrouwers View Post
Since there seems to be a misconception about it, I'll kindly point out that using systemd's journal is *not* required. You can simply ignore the journal all together, and the data it stores ( sitting in /run by default ) will sit and consume little to no space (10mb max by default, iirc? and configurable), and be wiped away at boot.

syslogging continues to work exactly how it does today. Again, projects like rsyslog even go so far as to provide native systemd files. Of course, in large scale operations which depend on heavy log monitoring, the standard system logger will never go away. And it's not the intention of systemd to ever do so.

Personally? I agree that the binary log format is a little strange. But as a single-user on my laptop, the journal has completely made a system logger obsolete. I can ask systemd about a service, and it tells me the state of the the service, and even pops up the last few entries regarding that service that the journal has seen. It's really, really neat in practice.

Again, it's all about choice. systemd has really cool stuff built in which caters a little easier to the standard user, but in the event you want the kitchen-sink solution, it works just as well.
lets not get into the improvements in processes and startup in deamons. let me continue studying i will end up here forever again.
 
Old 08-28-2012, 10:54 AM   #460
saulgoode
Member
 
Registered: May 2007
Distribution: Slackware
Posts: 288

Rep: Reputation: 155Reputation: 155
Quote:
Originally Posted by Mercury305 View Post
I am not underestimating. But encrypting log files makes lots of sense to slow them down... Hey then why use /etc/shadow? The hacker will decrypt it anyways right? lets just give up on security since everything is insecure and not worry about encryption from now on. Hackers can crack it anyway...
The efficacy of /etc/shadow is not that the passwords within it are encrypted (they were encrypted when they were originally in Unix's /etc/passwd), it is that /etc/shadow is only readable by root (/etc/passwd is world readable).

If your concern is in "slowing down" hackers who have gained root privilege, you should rethink your security model.

Last edited by saulgoode; 08-28-2012 at 10:56 AM.
 
2 members found this post helpful.
Old 08-28-2012, 10:56 AM   #461
cynwulf
Senior Member
 
Registered: Apr 2005
Posts: 2,727

Rep: Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367
Quote:
Originally Posted by Mercury305 View Post
You are talking to an exhacker here.
You should have said so earlier in the thread, I'd have doffed my cap......

Quote:
Originally Posted by saulgoode View Post
If your concern is in "slowing down" hackers who have gained root privilege, you should rethink your security model.
+1

Last edited by cynwulf; 08-28-2012 at 10:58 AM.
 
Old 08-28-2012, 11:04 AM   #462
Mercury305
Member
 
Registered: Jul 2012
Location: Rockville, MD
Distribution: CrunchBang / Ubuntu
Posts: 540

Rep: Reputation: Disabled
Quote:
Originally Posted by saulgoode View Post
The efficacy of /etc/shadow is not that the passwords within it are encrypted (they were encrypted when they were originally in Unix's /etc/passwd), it is that /etc/shadow is only readable by root (/etc/passwd is world readable).

If your concern is in "slowing down" hackers who have gained root privilege, you should rethink your security model.
what is the point of the Shadow file passwords being encrypted then? I'm about to break LQ rules by cursing you out here...
Hackers can crack it anyway right?
True...

so why encrypt it? Why encrypt anything if hackers can crack it so easily.

You think the log files for systemd is world readable?

(added: I am assuming that you don't think there are exploits to escalate permission priveledges huh?)

So lets all just depend on UNIX File Permissions... is that the way you deal with security here?

Common man.... im out! Too much nonsense in here!

Last edited by Mercury305; 08-28-2012 at 11:15 AM. Reason: more reasons...
 
Old 08-28-2012, 11:05 AM   #463
jtsn
Member
 
Registered: Sep 2011
Posts: 922

Rep: Reputation: 480Reputation: 480Reputation: 480Reputation: 480Reputation: 480
Quote:
Originally Posted by Mercury305 View Post
Please someone decypher this for me. I can't seem to understand the reasoning of what you are trying to say.
By keeping things simple, people defending their systems can be on par with the potential attackers. Make a system unique and you can even gain an advantage, because you know your individual environment, your attacker does not.

By standardizing on an unneeded complex solution, the black hats always gain an advantage even over experienced users. The attackers always understand more about complex opaque stuff, because they are smart -- some of them are even smarter than Poettering.

That's the whole point of the KISS philosophy regarding IT security.
 
2 members found this post helpful.
Old 08-28-2012, 11:19 AM   #464
Mercury305
Member
 
Registered: Jul 2012
Location: Rockville, MD
Distribution: CrunchBang / Ubuntu
Posts: 540

Rep: Reputation: Disabled
Quote:
Originally Posted by jtsn View Post
By keeping things simple, people defending their systems can be on par with the potential attackers. Make a system unique and you can even gain an advantage, because you know your individual environment, your attacker does not.

By standardizing on an unneeded complex solution, the black hats always gain an advantage even over experienced users. The attackers always understand more about complex opaque stuff, because they are smart -- some of them are even smarter than Poettering.

That's the whole point of the KISS philosophy regarding IT security.
If that is what you believe to be true to not encrypt log files more secure then plain text (simple files)... i sure won't be hiring you anytime soon.
 
Old 08-28-2012, 11:23 AM   #465
saulgoode
Member
 
Registered: May 2007
Distribution: Slackware
Posts: 288

Rep: Reputation: 155Reputation: 155
Quote:
Originally Posted by Mercury305 View Post
You think the log files for systemd is world readable?
The distinction is that there is no reason for the root account (or any other) to know a user's password, there are valid reasons for root to examine log files (else why would you even maintain them).


Quote:
Originally Posted by Mercury305 View Post
Common man.... im out!
You keep using that word. I do not think it means what you think it means. (Though I appreciate that you consider me not to be "elitist".)
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Informaton on systemd init system? arashi256 Linux - Newbie 1 06-04-2011 07:06 PM
LXer: openSUSE 11.4 M6 Kills HAL, Brings WebYaST, Avoids SystemD LXer Syndicated Linux News 0 01-28-2011 11:50 PM
LXer: This week at LWN: Systemd and Fedora 14 LXer Syndicated Linux News 0 09-07-2010 01:00 AM
LXer: Systemd Test Day on Tuesday 2010/09/07 LXer Syndicated Linux News 5 09-06-2010 10:52 AM
About Slackware 9.1 boot disk?? ftp://ftp.kpn.be/pub/linux/slackware/slackware-9.1-is AL3OMDAH Slackware 4 04-18-2007 09:54 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 05:44 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration