Gentoo Archives: gentoo-user

From: Rich Freeman <rich0@g.o>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] {OT} Allow work from home?
Date: Mon, 18 Jan 2016 18:30:57
Message-Id: CAGfcS_=wfnhior-a8vKi-kAA1_98KoMLgx9uP4kg+S_pGO9jgA@mail.gmail.com
In Reply to: Re: [gentoo-user] {OT} Allow work from home? by Grant
1 On Mon, Jan 18, 2016 at 12:06 PM, Grant <emailgrant@×××××.com> wrote:
2 >
3 > I am 100% web-based. I don't want to administrate machines outside of
4 > my LAN so I can imagine a Chromebook would end up vulnerable
5 > eventually.
6
7 The whole point of chromebooks is that they auto-update in a timely
8 fashion, and have a guaranteed end-of-life policy years into the
9 future. Sure, not quite as far as Microsoft guarantees, but nobody
10 runs a Windows laptop for even the length of a typical Chromebook EOL.
11 The chromebook also has secure boot and a signed OS, so if it is
12 corrupted it will go into recovery mode. You just stick a USB drive
13 with a rescue image on it (which you can create from any PC with a
14 chrome browser or an installer) and it fixes itself. I don't think
15 you can even turn off auto-updates - they're designed to be
16 idiot-proof. I'm not sure if as an enterprise administrator you can
17 set up a policy to force a reboot to update within n days or such if
18 it hasn't been shut down already after an update.
19
20 In any case, if you aren't going to own the client hardware, you
21 basically are going to have to assume it is vulnerable since nobody
22 maintains their PCs well. That means keyboard sniffing, cookie
23 stealing, and so on. If you're web-based a hostile browser could just
24 open another session in the background after the user authenticates
25 (2-factor or otherwise) and do whatever it wants to. Granted, I don't
26 know if anything is out in the wild which actually does this, and it
27 would probably need to be somewhat targeted to work (unless somebody
28 has a rootkit that just lets them interactively fire up another
29 browser on a VNC display or something using the same browser session).
30
31 Sure, a Chromebook will cost you $150, but that seems like a token
32 expense for an employee and it buys you a LOT of security. You can do
33 the same thing on another OS, but you're going to end up adding on a
34 lot of stuff on top of the OS to make it work, and I'm certain the
35 administrative overhead would be much higher. A chromebook is
36 basically what you get if you take a linux desktop and lock everything
37 down with TPM support and secure boot - they're even based on Gentoo.
38 Sure, you can DIY, but you're not going to do better without the
39 hardware support.
40
41 > Someone mentioned 2-factor authentication which sounds interesting.
42 > Are there good options for that besides SMS and Google Authenticator
43 > (or a similar mobile app)? Is there a good 2FA server in Portage? Is
44 > 2FA ever defeated in real life without the user's phone?
45
46 Do you mean you don't want something that involves typing in a TOTP or
47 similar? Google Authenticator just uses RFC 6238 so you can use any
48 other compliant client to generate the codes - I'm sure those exist
49 for Linux, but if you're going to do that you might as well just use
50 an RSA-based authentication since if you can steal the client key you
51 can steal the RFC6238 key. The whole point of 2-factor is that the
52 second factor tends to be something that isn't on the same PC as the
53 client.
54
55 There is a PAM-based authenticator in portage for Google
56 Authenticator, which again should work with anything RFC 6238
57 compliant. I use it for ssh password logins and it works great (well,
58 aside from having to reach for my phone anytime I log in via an
59 untrusted computer).
60
61 A much older option is s/key. I'm sure that is still around as well,
62 but I don't think it really has any advantages over RFC6238.
63
64 --
65 Rich

Replies

Subject Author
Re: [gentoo-user] {OT} Allow work from home? Grant <emailgrant@×××××.com>