Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
01-09-2007, 08:27 PM
|
#1
|
Member
Registered: Jan 2007
Location: Illinois
Distribution: Slackware 11
Posts: 37
Rep:
|
The danger of the Root! As sung by Mealoaf.
Is there anything natively dangerous about being logged into root besides your cat stepping on the keyboard? What I've been doing is keeping root logged into TTY2 (ctrl-alt-2) for when I need it, and I've wondered if there's a risk that just that might compromise my newbish system.
|
|
|
01-09-2007, 08:55 PM
|
#2
|
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870
|
Quote:
Originally Posted by AphoxemaG
Is there anything natively dangerous about being logged into root besides your cat stepping on the keyboard? What I've been doing is keeping root logged into TTY2 (ctrl-alt-2) for when I need it, and I've wondered if there's a risk that just that might compromise my newbish system.
|
well, besides the cat thing, if there's someone else around they could do a ctrl-alt-2 and have root... but if you're the only one who uses your computer then it's not that big of a deal... the big problem is when you _use_ your computer as root for non-administrative tasks - having root logged-into a TTY is IMHO (physical access issues aside) no more dangerous than having some programs running with root privilages on your system (X.org, Cron, Sshd, etc.) - which is something normal on almost any linux desktop...
Last edited by win32sux; 01-09-2007 at 08:57 PM.
|
|
|
01-09-2007, 09:20 PM
|
#3
|
Member
Registered: Jan 2007
Location: Illinois
Distribution: Slackware 11
Posts: 37
Original Poster
Rep:
|
Oh, good, then I don't have anything to worry about. Right now I'm using it to control my wireless, which I have to mess with alot because the neighbor I'm borrowing it from is 500 ft away, and I have to reconnect often, and to mount or unmount the CD drive.
|
|
|
01-09-2007, 11:03 PM
|
#4
|
Member
Registered: Dec 2006
Location: Vancouver, BC
Distribution: Debian,Ubuntu,Slackware
Posts: 479
Rep:
|
Quote:
Originally Posted by AphoxemaG
Oh, good, then I don't have anything to worry about. Right now I'm using it to control my wireless, which I have to mess with alot because the neighbor I'm borrowing it from is 500 ft away, and I have to reconnect often, and to mount or unmount the CD drive.
|
You don't need root to mount/umount the cdrom drive.
Just add "users" option to the cdrom line /etc/fstab.
Perhaps you should tell your neighbor to look into wpa2 encryption to make sure that only the two of you have access to his connection. He might be concerned about someone borrowing his internet connection in the same way you are concerned about someone borrowing your linux box as root...
you know, for good karma and all that...
|
|
|
01-09-2007, 11:12 PM
|
#5
|
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870
|
word... you also don't need root for the wireless stuff...
install something like NetworkManager and save some sanity... 
Last edited by win32sux; 01-09-2007 at 11:16 PM.
|
|
|
01-11-2007, 07:38 AM
|
#6
|
Member
Registered: Jan 2007
Location: Illinois
Distribution: Slackware 11
Posts: 37
Original Poster
Rep:
|
He's got this idea stuck in his head that WEP is safer than WPA, even though I showed him the whole FBI thing. One of those big 'administrators' that don't administer much anything besides their home computer.
I just use dialup for secure stuff and the wireless for faster stuff. Honestly, I feel strangely more comfortable with someone on the other side of the world getting my private information than any kids around here with Airopeek and too much free time...
... wait...
|
|
|
All times are GMT -5. The time now is 01:57 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|