security.7 (8596de530307b9b8316d38fad6cf9c371a45db35) | security.7 (f167d7fb3e81bd884d7b76b78f1216c5afc5db3d) |
---|---|
1.\" Copyright (c) 1998, Matthew Dillon. Terms and conditions are those of 2.\" the BSD Copyright as specified in the file "/usr/src/COPYRIGHT" in 3.\" the source tree. 4.\" 5.\" $FreeBSD$ 6.\" 7.Dd September 18, 1999 8.Dt SECURITY 7 --- 92 unchanged lines hidden (view full) --- 101.Pp 102System administrators must keep in mind that there are potentially many ways 103to break root on a machine. The attacker may know the root password, 104the attacker 105may find a bug in a root-run server and be able to break root over a network 106connection to that server, or the attacker may know of a bug in an suid-root 107program that allows the attacker to break root once he has broken into a 108user's account. If an attacker has found a way to break root on a machine, | 1.\" Copyright (c) 1998, Matthew Dillon. Terms and conditions are those of 2.\" the BSD Copyright as specified in the file "/usr/src/COPYRIGHT" in 3.\" the source tree. 4.\" 5.\" $FreeBSD$ 6.\" 7.Dd September 18, 1999 8.Dt SECURITY 7 --- 92 unchanged lines hidden (view full) --- 101.Pp 102System administrators must keep in mind that there are potentially many ways 103to break root on a machine. The attacker may know the root password, 104the attacker 105may find a bug in a root-run server and be able to break root over a network 106connection to that server, or the attacker may know of a bug in an suid-root 107program that allows the attacker to break root once he has broken into a 108user's account. If an attacker has found a way to break root on a machine, |
109.Pa the attacker may not have a need to install a backdoor. | 109the attacker may not have a need to install a backdoor. |
110Many of the root holes found and closed to date involve a considerable amount 111of work by the hacker to cleanup after himself, so most hackers do install 112backdoors. This gives you a convienient way to detect the hacker. Making 113it impossible for a hacker to install a backdoor may actually be detrimental 114to your security because it will not close off the hole the hacker found to 115break in in the first place. 116.Pp 117Security remedies should always be implemented with a multi-layered --- 585 unchanged lines hidden --- | 110Many of the root holes found and closed to date involve a considerable amount 111of work by the hacker to cleanup after himself, so most hackers do install 112backdoors. This gives you a convienient way to detect the hacker. Making 113it impossible for a hacker to install a backdoor may actually be detrimental 114to your security because it will not close off the hole the hacker found to 115break in in the first place. 116.Pp 117Security remedies should always be implemented with a multi-layered --- 585 unchanged lines hidden --- |