File: remote_shell_access.html

package info (click to toggle)
satan 1.1.1-18
  • links: PTS
  • area: non-free
  • in suites: potato, woody
  • size: 1,440 kB
  • ctags: 1,425
  • sloc: ansic: 6,183; perl: 4,867; makefile: 328; sh: 221
file content (58 lines) | stat: -rw-r--r-- 1,581 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
<HTML>
<HEAD>
<TITLE>Tutorial - remote shell access</TITLE>
<LINK REV="made" HREF="mailto:satan@fish.com">
</HEAD>
<BODY BGCOLOR="#FFFFFF">

<H1><IMG SRC="../../images/satan.gif">Remote shell access</H1>

<HR>

<H3>Summary</H3>

Remote shell/remote login access from arbitrary hosts.

<H3>Impact</H3>

The machine can be taken over by any malicious (super)user on the network.

<H3>The problem</H3>

When the remote login/remote shell service trusts every host on the
network,  a malicious superuser on an arbitrary host can gain access as
any user (except perhaps <em>root</em>).  Once inside, the intruder
can replace system programs or configuration files (such as the
password file) and take over the machine.

<p>
In addition, there are guest or administrative accounts that might not
have passwords protecting the account, which allows anyone to remotely
login as that user and gain access to the host.

<H3>Fix</H3>

Remove the wildcard (+) from the /etc/hosts.equiv file. Be careful with
the use of the <tt>-@group</tt> netgroup feature, as there are many
incorrect implementations.

<p>

Delete or disable any accounts without a password from the system or
NIS password file.

<H3>Other tips</H3>

<ul>

<li> Give system accounts such as <em>bin</em> and <em> daemon</em> a
non-functional shell (such as <em>/bin/false</em>) and put them in
the <em>/etc/ftpusers</em> file so they cannot use ftp.

<li>See the
<a href="../../docs/admin_guide_to_cracking.html#remote-shell-access">Admin
Guide to Cracking</a> for an example of why this is a problem.

</ul>
</BODY>
</HTML>