LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Enterprise Linux Forums > Linux - Enterprise
User Name
Password
Linux - Enterprise This forum is for all items relating to using Linux in the Enterprise.

Notices


Reply
  Search this Thread
Old 08-28-2014, 07:32 AM   #1
NevemTeve
Senior Member
 
Registered: Oct 2011
Location: Budapest
Distribution: Debian/GNU/Linux, AIX
Posts: 4,862
Blog Entries: 1

Rep: Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869
Sysadmins and Ethics


<OffTopic>Using tools like disc-quota, ulimit, rssh and whatnot is hardly the same thing as looking into users' history files... What's next? Stealing their data from ~/.ssh/id_* files? Or are you guys doing that already?</OffTopic>
 
Old 08-28-2014, 08:21 AM   #2
loadedmind
Member
 
Registered: Sep 2003
Location: Texas
Distribution: Red Hat/CentOS
Posts: 302
Blog Entries: 4

Rep: Reputation: Disabled
Nevem> I'll bet you're one of those people that, even though you didn't buy your work computer with your own money, you still feel it's yours to do with as you see fit. Am I right? How you can possibly associate monitoring with theft is beyond me. That said, this isn't the place to debate such things. If you like, PM me and we can discuss further.
 
Old 08-28-2014, 08:36 AM   #3
NevemTeve
Senior Member
 
Registered: Oct 2011
Location: Budapest
Distribution: Debian/GNU/Linux, AIX
Posts: 4,862

Original Poster
Blog Entries: 1

Rep: Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869
Would it be all right for you if your employer monitored your traffic with your bank, because the computer you use belongs to them?
 
Old 08-28-2014, 08:52 AM   #4
loadedmind
Member
 
Registered: Sep 2003
Location: Texas
Distribution: Red Hat/CentOS
Posts: 302
Blog Entries: 4

Rep: Reputation: Disabled
Nevem -> When you go to work and use work assets, you're there to do a job for them. There's an underlying fallacy to your logic - assuming that anything you do on work assets is personal/private. Perhaps it's different where you work/live, but I can assure you, this is not the case in the States. You forfeit all privacy when logging into a work machine. Period.

Again, if you'd like to discuss this further, feel free to PM me. This is not the place for this sort of banter.

Mods -> feel free to remove irrelevant posts to this topic, including mine.
 
Old 08-28-2014, 08:55 AM   #5
schneidz
LQ Guru
 
Registered: May 2005
Location: boston, usa
Distribution: fedora-35
Posts: 5,313

Rep: Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918
i see both sides of this issue; however, this is the reason i put masking tape to cover the webcam on my work-at-home laptop:
https://en.wikipedia.org/wiki/Robbin...chool_District

eventhough i do know i'm not supposed to run fedora live-usb on this thing, i do anyways.

Last edited by schneidz; 08-28-2014 at 08:57 AM.
 
Old 08-28-2014, 09:01 AM   #6
NevemTeve
Senior Member
 
Registered: Oct 2011
Location: Budapest
Distribution: Debian/GNU/Linux, AIX
Posts: 4,862

Original Poster
Blog Entries: 1

Rep: Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869
(I know someone who has put such a tape on his mobile phone's camera... I thought he was paranoid. Now, I don't think so any more.)
 
Old 08-28-2014, 09:04 AM   #7
loadedmind
Member
 
Registered: Sep 2003
Location: Texas
Distribution: Red Hat/CentOS
Posts: 302
Blog Entries: 4

Rep: Reputation: Disabled
Ok, now THAT is just WRONG. Was an interesting read though and certainly raises some new questions. I'm sure there will be more of this kind of thing to push the envelope in the future.
 
Old 08-28-2014, 09:58 AM   #8
NevemTeve
Senior Member
 
Registered: Oct 2011
Location: Budapest
Distribution: Debian/GNU/Linux, AIX
Posts: 4,862

Original Poster
Blog Entries: 1

Rep: Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869
<Off>Right, forget privacy, have a look at security. Assume an Oracle password got compromised, and a user admits they have used this command:

Code:
sqlplus user/password@tnsid
Someone remembers that there is an automatism that periodically check users' history. Who will be blamed for the potential data-loss?</Off>
 
Old 08-28-2014, 10:51 AM   #9
loadedmind
Member
 
Registered: Sep 2003
Location: Texas
Distribution: Red Hat/CentOS
Posts: 302
Blog Entries: 4

Rep: Reputation: Disabled
You've lost me. How will checking history cause data loss?
 
Old 08-28-2014, 11:18 AM   #10
NevemTeve
Senior Member
 
Registered: Oct 2011
Location: Budapest
Distribution: Debian/GNU/Linux, AIX
Posts: 4,862

Original Poster
Blog Entries: 1

Rep: Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869
We started with the hypothesys that an Oracle userid got compromised. Important data might have been stolen, deleted or changed.
Now someone admits they weren't careful enough; their history did contain the password. They are in trouble all right.
And who else might be in trouble? Yourself, because you created this history-checking system, so you was in the position of finding the password.

Note: history files are valueable sources of information for haxors, too; especially that of root users'
 
Old 08-28-2014, 12:37 PM   #11
loadedmind
Member
 
Registered: Sep 2003
Location: Texas
Distribution: Red Hat/CentOS
Posts: 302
Blog Entries: 4

Rep: Reputation: Disabled
Still doesn't matter. As systems administrators, we're ultimately responsible for the machines - regardless of any scenario you can hypothesize. If for no other reason you were able to determine who was the culprit, any other point is moot. Users shouldn't be doing anything administrative without involving the system owner(s) anyway.
 
Old 08-28-2014, 01:12 PM   #12
NevemTeve
Senior Member
 
Registered: Oct 2011
Location: Budapest
Distribution: Debian/GNU/Linux, AIX
Posts: 4,862

Original Poster
Blog Entries: 1

Rep: Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869Reputation: 1869
Another point to think about: You said you wanted to monitor user activity to check if they are using git 'right' or 'wrong'. What if they are clever enough to do their git-abusing-evilness programatically (shell script or otherwise). Even your best 'grep git' command won't find the evidence.
 
Old 08-28-2014, 01:20 PM   #13
loadedmind
Member
 
Registered: Sep 2003
Location: Texas
Distribution: Red Hat/CentOS
Posts: 302
Blog Entries: 4

Rep: Reputation: Disabled
Frankly, that doesn't matter either. A decent systems administrator will be able to put things in place that would prevent their own demise, i.e. access control lists, tripwire, fanotify/inotify (as you pointed out), xymon, etc. For this particular case, the users would actually be doing themselves an injustice more than us because, eventually, their actions will lead to them not being able to get their own jobs done. There would be no advantage to their nefariousness as it would eventually get them fired.
 
Old 08-28-2014, 01:26 PM   #14
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by NevemTeve View Post
Another point to think about
While I do see the value in playing devil's advocate you have on the other hand taken this thread so far off topic across so many posts, all without constructively helping the OP achieve his goal and even in the face of his polite request to stop off topic conversation that I think you should, with all due respect, really reconsider if you should continue posting?..
 
Old 08-28-2014, 01:33 PM   #15
schneidz
LQ Guru
 
Registered: May 2005
Location: boston, usa
Distribution: fedora-35
Posts: 5,313

Rep: Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918
hi unspawn, would you be able to move post #9 and below to a different thread in non-general... then maybe others can join in the fun ?
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Sysadmins, what do you do at your job? zokken General 6 02-17-2009 03:11 PM
LXer: IT and Ethics LXer Syndicated Linux News 0 03-20-2008 03:10 AM
IT professionals and ethics sachitha General 3 03-08-2006 07:16 PM
Question of Ethics leeach Linux - Security 6 03-27-2004 11:21 PM
linux ethics galabad General 8 08-01-2003 01:12 PM

LinuxQuestions.org > Forums > Enterprise Linux Forums > Linux - Enterprise

All times are GMT -5. The time now is 06:15 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration