Webmonkey is awesome, and so calling someone a web monkey is a great compliment. It's like being the support llama.
This? This is a glorified php-pusher with sudo permissions. Who complained when *his last name all in lowercase* was rejected as insufficiently complex to use as a password.
There's no evidence that anyone got in. There's no evidence that anything happened. The rest of the network shows no unusual traffic from the developers' ghetto[1] to the real network.
But right now, "password" doesn't work and nobody knows the root password to the machine.
[1]: Developers cannot be trusted. This machine, specifically, listens to port 22 from the outside *over my objections*[2], and *nothing* gets to go between it and the network without the router logging and sniffing it. Why? Because the devs *have sudo access*.
[2]: My objections are no longer being overruled. The university guys can log in, on a nonstandard port, from campus. All other internet access is going bye-bye. All this, of course, is predicated on my turning it on again without internet access and wiping the thing.
Because the machine belongs to the developers, does nothing of any importance, and they need to be able to run sudo sometimes without calling me first. So, the head of the team's account can run sudo.
He got *clever* and discovered that sudo lets him change the root password, and if they log in as root, they don't have to type "sudo" in front of things and it stops giving them those silly permissions errors. Meaning, *he* doesn't have to be called any more when one of the other developers needs sudo access!
So he changed the password to something simple that they would all remember and told them all to start using "root" instead of their own usernames when logging in.
IIRC, this was the solution at MIT on the public machines. Just log in as root. The password was left as something obvious.
Of course, these were public terminals, and they got wiped and reset very frequently. And if you telnetted out from them, a program would automatically snoop you, follow you, log into that machine, and change your password for you (and IIRC send you email congratulating you on your stupidity, for when your admin let you back in).
Ah. So just smart enough to make being really fucking stupid dangerous. I understand.
That said, it's a common practice to give devs dedicated test machines they have root access to. Of course, part is that common practice is to only give them systems nobody cares about, which aren't connected to the network, and which are routinely ghosted back to fresh install because they get fubar'd almost immediately.
well, I suppose it's a little better than setting username and password to factory default . . . (yeah, I know, not precisely applicable to this situation) But why is it always "password"? Why don't they ever pick some other easy to remember password? "Swordfish" perhaps?
I'm almost wondering if it would be comparatively more secure to have, up on the wall (not facing the windows) a poster - saying "The password is SWORDFISH, doofus!"
That's got to be slightly better than "password" anyways.
Swordfish isn't better than password because its a regular word, any script kiddy would have that word in his dictionary for BFI attacks.
You would do better with non-regular words like wordfishs.
Sometimes having issues with spelling (like i do) comes in weirdly handy when it comes to security. When I was in School I did a Netware install as a project for the coarse and I misspelled the word administrator. when my teacher went to log in to check my work and grade me, he couldn't. when i went to log in, i could. took us about 20 minutes before he noticed i was spelling administrator differently.
sometimes the simplest things are the most effective.
(no subject)
Date: 2008-11-17 09:07 pm (UTC)(no subject)
Date: 2008-11-17 09:07 pm (UTC)(no subject)
Date: 2008-11-17 09:13 pm (UTC)(no subject)
Date: 2008-11-17 09:21 pm (UTC)(no subject)
Date: 2008-11-17 09:27 pm (UTC)(no subject)
Date: 2008-11-17 10:30 pm (UTC)Also I'm getting 5 tomorrow me thinks.
(no subject)
Date: 2008-11-18 12:04 am (UTC)(no subject)
Date: 2008-11-17 09:14 pm (UTC)(no subject)
Date: 2008-11-18 01:14 am (UTC)This? This is a glorified php-pusher with sudo permissions. Who complained when *his last name all in lowercase* was rejected as insufficiently complex to use as a password.
(no subject)
Date: 2008-11-18 03:17 pm (UTC)(no subject)
Date: 2008-11-18 01:34 am (UTC)(no subject)
Date: 2008-11-17 09:17 pm (UTC)*sigh* FORK IN THE EYE!!!
How bad was it?
Date: 2008-11-17 09:19 pm (UTC)Re: How bad was it?
Date: 2008-11-17 09:39 pm (UTC)There's no evidence that anyone got in.
There's no evidence that anything happened.
The rest of the network shows no unusual traffic from the developers' ghetto[1] to the real network.
But right now, "password" doesn't work and nobody knows the root password to the machine.
[1]: Developers cannot be trusted. This machine, specifically, listens to port 22 from the outside *over my objections*[2], and *nothing* gets to go between it and the network without the router logging and sniffing it. Why? Because the devs *have sudo access*.
[2]: My objections are no longer being overruled. The university guys can log in, on a nonstandard port, from campus. All other internet access is going bye-bye. All this, of course, is predicated on my turning it on again without internet access and wiping the thing.
Re: How bad was it?
Date: 2008-11-17 10:44 pm (UTC)Re: How bad was it?
Date: 2008-11-17 10:52 pm (UTC)Re: How bad was it?
Date: 2008-11-17 10:54 pm (UTC)It's a stock FC9 box that was set up and given to the codemonkeys to throw feces at.
Re: How bad was it?
Date: 2008-11-17 11:49 pm (UTC)PermitRootLogin should get set to "no" in /etc/ssh/sshd_config
Re: How bad was it?
Date: 2008-11-18 12:34 am (UTC)Yes, yes, I know, "many system design flaws can be traced to unwarrantedly anthropomorphising the user".
(no subject)
Date: 2008-11-17 09:21 pm (UTC)(no subject)
Date: 2008-11-17 09:24 pm (UTC)(no subject)
Date: 2008-11-17 10:32 pm (UTC)(no subject)
Date: 2008-11-17 10:53 pm (UTC)(no subject)
Date: 2008-11-17 11:02 pm (UTC)(no subject)
Date: 2008-11-17 11:04 pm (UTC)(no subject)
Date: 2008-11-17 11:37 pm (UTC)(no subject)
Date: 2008-11-17 11:54 pm (UTC)(no subject)
Date: 2008-11-17 11:52 pm (UTC)(no subject)
Date: 2008-11-17 09:33 pm (UTC)(no subject)
Date: 2008-11-17 09:33 pm (UTC)(no subject)
Date: 2008-11-17 09:36 pm (UTC)(no subject)
Date: 2008-11-17 09:40 pm (UTC)(no subject)
Date: 2008-11-17 10:32 pm (UTC)(no subject)
Date: 2008-11-18 04:03 am (UTC)Other. Fucking. People. *headdesk*
-- A <3
(no subject)
Date: 2008-11-17 10:40 pm (UTC)(no subject)
Date: 2008-11-17 10:52 pm (UTC)He got *clever* and discovered that sudo lets him change the root password, and if they log in as root, they don't have to type "sudo" in front of things and it stops giving them those silly permissions errors. Meaning, *he* doesn't have to be called any more when one of the other developers needs sudo access!
So he changed the password to something simple that they would all remember and told them all to start using "root" instead of their own usernames when logging in.
(no subject)
Date: 2008-11-17 10:54 pm (UTC)(no subject)
Date: 2008-11-19 01:05 am (UTC)Of course, these were public terminals, and they got wiped and reset very frequently. And if you telnetted out from them, a program would automatically snoop you, follow you, log into that machine, and change your password for you (and IIRC send you email congratulating you on your stupidity, for when your admin let you back in).
Re: How bad was it?
Date: 2008-11-19 06:39 am (UTC)That said, it's a common practice to give devs dedicated test machines they have root access to. Of course, part is that common practice is to only give them systems nobody cares about, which aren't connected to the network, and which are routinely ghosted back to fresh install because they get fubar'd almost immediately.
(no subject)
Date: 2008-11-17 11:13 pm (UTC)(no subject)
Date: 2008-11-18 12:07 am (UTC)(no subject)
Date: 2008-11-18 12:34 am (UTC)(no subject)
Date: 2008-11-18 01:05 am (UTC)That's got to be slightly better than "password" anyways.
(no subject)
Date: 2008-11-18 08:07 pm (UTC)You would do better with non-regular words like wordfishs.
Sometimes having issues with spelling (like i do) comes in weirdly handy when it comes to security. When I was in School I did a Netware install as a project for the coarse and I misspelled the word administrator. when my teacher went to log in to check my work and grade me, he couldn't. when i went to log in, i could. took us about 20 minutes before he noticed i was spelling administrator differently.
sometimes the simplest things are the most effective.