Gentoo Archives: gentoo-hardened

From: Hilco Wijbenga <hilco.wijbenga@×××××.com>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] New Server, considering hardened, need pointers to tfm...
Date: Sun, 11 Dec 2011 20:02:49
Message-Id: CAE1pOi1JNGR4EPt2Uz1X_fvaKJS12npp8RnnR85uMimPeST=OA@mail.gmail.com
In Reply to: Re: [gentoo-hardened] New Server, considering hardened, need pointers to tfm... by Alex Efros
1 On 11 December 2011 06:53, Alex Efros <powerman@××××××××.name> wrote:
2 > On Sun, Dec 11, 2011 at 02:25:19PM +0000, Sven Vermeulen wrote:
3 >> > 1)  How can
4 >> >     4.2.4.1. Root Logon Through SSH Is Not Allowed
5 >> >     increase security, if we're already using
6 >> >     4.2.4.2. Public Key Authentication Only
7 >> >     Disabling root may have sense with password auth, but with keys it is
8 >> >     just useless inconvenience.
9 >>
10 >> I read somewhere that security is about making things more inconvenient for
11 >> malicious people than for authorized ones.
12 >>
13 >> For me, immediately logging in as root is not done. I want to limit root
14 >> access through the regular accounts on the system (with su(do)). I never had
15 >> the need to log on as root immediately myself.
16 >
17 > Understood. But I still don't see how this can increase security.
18
19 It is my understanding this is not so much about security per se as it
20 is about auditing. Especially in an environment with more than one
21 admin.
22
23 Let's say there are two admins (A and B) who both log on (remotely) as
24 root. Then there is no easy way to tell who did what. Leaving an audit
25 trail is useful and in many environments simply required.
26
27 Moreover, if admin A's account is compromised then a black hat can use
28 admin A's access to root to remotely log on to any machine admin A has
29 access to. This will be hard to detect and it will be hard(er) to
30 determine how the black hat gained access. If admin A had logged on as
31 admin A instead of root then it would be more obvious it was admin A's
32 account that had been compromised.