security.7 (57e4378bf656a59240eb6ce73cf8bc67edcc92c8) security.7 (b94231dacac553c3cfd4d0917f87231a65727bf2)
1.\" Copyright (c) 1998, Matthew Dillon. Terms and conditions are those of
2.\" the BSD Copyright as specified in the file "/usr/src/COPYRIGHT" in
3.\" the source tree.
4.\"
5.\" $FreeBSD$
6.\"
7.Dd September 18, 1999
8.Dt SECURITY 7

--- 76 unchanged lines hidden (view full) ---

85his remote access logs looking for suspicious source addresses
86even for successful logins.
87.Pp
88One must always assume that once an attacker has access to a user account,
89the attacker can break root. However, the reality is that in a well secured
90and maintained system, access to a user account does not necessarily give the
91attacker access to root. The distinction is important because without access
92to root the attacker cannot generally hide his tracks and may, at best, be
1.\" Copyright (c) 1998, Matthew Dillon. Terms and conditions are those of
2.\" the BSD Copyright as specified in the file "/usr/src/COPYRIGHT" in
3.\" the source tree.
4.\"
5.\" $FreeBSD$
6.\"
7.Dd September 18, 1999
8.Dt SECURITY 7

--- 76 unchanged lines hidden (view full) ---

85his remote access logs looking for suspicious source addresses
86even for successful logins.
87.Pp
88One must always assume that once an attacker has access to a user account,
89the attacker can break root. However, the reality is that in a well secured
90and maintained system, access to a user account does not necessarily give the
91attacker access to root. The distinction is important because without access
92to root the attacker cannot generally hide his tracks and may, at best, be
93able to do nothing more then mess with the user's files or crash the machine.
93able to do nothing more than mess with the user's files or crash the machine.
94User account compromises are very common because users tend not to take the
95precautions that sysads take.
96.Pp
97System administrators must keep in mind that there are potentially many ways
98to break root on a machine. The attacker may know the root password,
99the attacker
100may find a bug in a root-run server and be able to break root over a network
101connection to that server, or the attacker may know of a bug in an suid-root

--- 576 unchanged lines hidden ---
94User account compromises are very common because users tend not to take the
95precautions that sysads take.
96.Pp
97System administrators must keep in mind that there are potentially many ways
98to break root on a machine. The attacker may know the root password,
99the attacker
100may find a bug in a root-run server and be able to break root over a network
101connection to that server, or the attacker may know of a bug in an suid-root

--- 576 unchanged lines hidden ---