1 |
On Mon, Jan 18, 2016 at 12:06 PM, Grant <emailgrant@×××××.com> wrote: |
2 |
> |
3 |
> I am 100% web-based. I don't want to administrate machines outside of |
4 |
> my LAN so I can imagine a Chromebook would end up vulnerable |
5 |
> eventually. |
6 |
|
7 |
The whole point of chromebooks is that they auto-update in a timely |
8 |
fashion, and have a guaranteed end-of-life policy years into the |
9 |
future. Sure, not quite as far as Microsoft guarantees, but nobody |
10 |
runs a Windows laptop for even the length of a typical Chromebook EOL. |
11 |
The chromebook also has secure boot and a signed OS, so if it is |
12 |
corrupted it will go into recovery mode. You just stick a USB drive |
13 |
with a rescue image on it (which you can create from any PC with a |
14 |
chrome browser or an installer) and it fixes itself. I don't think |
15 |
you can even turn off auto-updates - they're designed to be |
16 |
idiot-proof. I'm not sure if as an enterprise administrator you can |
17 |
set up a policy to force a reboot to update within n days or such if |
18 |
it hasn't been shut down already after an update. |
19 |
|
20 |
In any case, if you aren't going to own the client hardware, you |
21 |
basically are going to have to assume it is vulnerable since nobody |
22 |
maintains their PCs well. That means keyboard sniffing, cookie |
23 |
stealing, and so on. If you're web-based a hostile browser could just |
24 |
open another session in the background after the user authenticates |
25 |
(2-factor or otherwise) and do whatever it wants to. Granted, I don't |
26 |
know if anything is out in the wild which actually does this, and it |
27 |
would probably need to be somewhat targeted to work (unless somebody |
28 |
has a rootkit that just lets them interactively fire up another |
29 |
browser on a VNC display or something using the same browser session). |
30 |
|
31 |
Sure, a Chromebook will cost you $150, but that seems like a token |
32 |
expense for an employee and it buys you a LOT of security. You can do |
33 |
the same thing on another OS, but you're going to end up adding on a |
34 |
lot of stuff on top of the OS to make it work, and I'm certain the |
35 |
administrative overhead would be much higher. A chromebook is |
36 |
basically what you get if you take a linux desktop and lock everything |
37 |
down with TPM support and secure boot - they're even based on Gentoo. |
38 |
Sure, you can DIY, but you're not going to do better without the |
39 |
hardware support. |
40 |
|
41 |
> Someone mentioned 2-factor authentication which sounds interesting. |
42 |
> Are there good options for that besides SMS and Google Authenticator |
43 |
> (or a similar mobile app)? Is there a good 2FA server in Portage? Is |
44 |
> 2FA ever defeated in real life without the user's phone? |
45 |
|
46 |
Do you mean you don't want something that involves typing in a TOTP or |
47 |
similar? Google Authenticator just uses RFC 6238 so you can use any |
48 |
other compliant client to generate the codes - I'm sure those exist |
49 |
for Linux, but if you're going to do that you might as well just use |
50 |
an RSA-based authentication since if you can steal the client key you |
51 |
can steal the RFC6238 key. The whole point of 2-factor is that the |
52 |
second factor tends to be something that isn't on the same PC as the |
53 |
client. |
54 |
|
55 |
There is a PAM-based authenticator in portage for Google |
56 |
Authenticator, which again should work with anything RFC 6238 |
57 |
compliant. I use it for ssh password logins and it works great (well, |
58 |
aside from having to reach for my phone anytime I log in via an |
59 |
untrusted computer). |
60 |
|
61 |
A much older option is s/key. I'm sure that is still around as well, |
62 |
but I don't think it really has any advantages over RFC6238. |
63 |
|
64 |
-- |
65 |
Rich |