Quote:
Originally Posted by smoker
Other people who post here don't have to deal with the problem, just pontificate on it at your expense.
|
Such a response only shows disrespect and a lack of understanding for what we try to do here. As your replies in
this thread warrant a more verbose response, here it goes:
Frequenting the Linux Security forum, and liking what I saw, I became a Linuxquestions.org member approximately three years before you did. Like in the fora I was an active member of before I came to LQ, I have taken an active interest in all GNU/Linux security matters here up to the point that I can say that until recently, I have taken part in responding to at least ninety-nine percent of the security incidents members have posted about in this forum over the years.
The reason I require security incidents to be handled a certain way is that in the LQ Linux Security forum at the time, as well as in other major GNU/Linux fora on the 'net, members and moderators do not tend to apply a structured approach to incident handling making it a fire-and-forget chaos with "I got first post" competition running wild, members telling fellow members their machine got rooted w/o evidence, offering reinstallation "advice" without knowing entry vectors or other confusing messages. Our LQ members combined knowledge and R/L experience, a certain level of quality and using a structured approach towards incident handling makes the LQ Linux Security forum stand out from the rest.
It does require LQ members who want to do incident response (IR) to have the right mindset though: realizing that running GNU/Linux is all about performance, protecting assets and providing services in a continuous, stable and secure way. That security incidents are not only bad for the "victim" but also are bad news for those connected to the same networks and that they reflect badly on the GNU/Linux image as well. This means any
security incidents have to be handled correctly, swiftly and decisively. And that's why you see me sometimes post that
in the LQ Linux Security forum we deal with facts, not fiction. After all a security issue, computing in general, in essence is binary: integrity is either maintained or it is not, a machine is either compromised or it is not. Handling security incidents is like troubleshooting in general: until the situation is clear the "victim" should be asked questions. "Victims" often do not have the right amount of knowledge to assess things on their own but with a little help they often can work out the math themselves. Often help means making the "victim" see priorities differently, that one can not judge a situation before information is gathered, applying order to the whole fact-finding process and interpreting posted results.
That is why members who "think" everything is OK, "guess" a machine is "probably" compromised or tell a fellow member "not to worry" are reminded, if necessary with use of --force, that that is not the right approach to help. That is why telling a fellow LQ member "you've been rooted"
without proof is useless. That is why telling a fellow LQ member to restore a backup without pinpointing the infection vector(s) (if any) is
plain wrong. That is why telling a member to "cut losses and start again" without knowing if a breach of security has actually occurred is
at least inefficient and ill advice.
Quote:
Originally Posted by smoker
People who continue to deliberately misunderstand it and use it to "win" arguments need to get a life.
|
From the above naturally follows that I do not care for "winning" an argument about IR. I'm
telling you how it should be done in this forum. In case anything is unclear you're invited to discuss the IR process here. Anything else should probably be in a forum like /General or be redirected in an email to me.