New Linux Distros Insecure by Default? 122
An anonymous reader submits Two articles on Codefez and NewsForge review releases of Linspire 5.0 and Linare. Both these distributions let the user run as Root by default after installation, and don't prompt to set up a user ID. Is this a start of a new trend of 'dumbed down' Linux distributions that will damage the Linux reputation for security?"
Morons (Score:5, Insightful)
Re:Morons (Score:5, Insightful)
Insecure computers affect us all. We have the right to be upset.
Re:Morons (Score:3, Informative)
Linspire has been doing this - and making excuses for the practice - ever since Hector was a pup.
That's about four years, or somethin'.
Re:Morons (Score:1)
If I run something stupid I can have my files tampered with and every time I tun my computer it could become a bot (using high port numbers).
I could lose all my personal data also.
I could do things to make it more secure (noexec on ~, but then root becomes needed for stupid little scripts), but the deafult installs do not do that.
Multi user systems where ~ is noexec are more secure then running as root, but single user ones where ~ can h
Re:Morons (Score:1)
Re:Morons (Score:2, Insightful)
Mod summary: wrong (Score:3, Informative)
Not perfect, but not as egregious as it was in Linspire 4.5 either.
linspire (Score:4, Insightful)
Somewhat old news (Score:3, Informative)
A quick search reveals this article from 2003 [slashdot.org] in which the founder of Lindows states his case for the matter...
And this review from 2002 [extremetech.com] (linked to by
No (Score:5, Interesting)
I've settled down in my Distro-hopping, so the examples I used in most cases were over four years old (Yggdrasil most certainly was.
None of them have ever spent much time explaining how sudo works and why you should use it.
Re:No (Score:3, Informative)
Re:No (Score:1)
Say I don't use sudo and I set up ssh to disallow root logins. That means that if someone hypothetically cracks my user password, they then have to crack the root password independently. T
Re:No (Score:2)
Re:No (Score:1)
Sudo (Score:1)
Re:Sudo (Score:2)
1) Someone manages to guess your password.
2) That person makes a hidden directory.
3) That person installs a keylogger in that hidden directory. The keylogger's executable name is "ls", and it starts the process of logging keys, then issues an actual ls command using the arguments specified.
4) That person changes your path to point to the hidden directory first.
The first time you run ls after he has done
Re:Sudo (Score:2)
Re:No (Score:2)
This is immensely important if you want to protect your computer from trojan horses, macro viruses, etc. - a great number of Windows viruses and such can't infect the computers of people who don't run as Administrator all the time.
Re:No (Score:2)
Re:No (Score:2)
Ie, if a user needs the ability to start/stop some daemon, you could allow the init file for that daemon in /etc/sudoers, but not give them sudo access to anything else.
smash.
Re:No (Score:3, Informative)
There's enormous amounts of material on the 'net for setting up sudo (which, be warned, is a very non-trivial task if you want to do it properly), so I won't try and replicate any of that.
The biggest advantages are:
1. An audit trail (every sudo command is logged).
2. The ability to restrict what a user can 'sudo' to individual commands (even individual parameters, I suspect, although I've never tried).
I gu
Re:No (Score:1)
Re:No (Score:4, Informative)
It ships with the root account DISABLED!
It threw me off at first, but the documentation clearly explains how to use sudo and why they decided it is better to set up the first user as a sudoer rather than set up an active root account and a dumbed down user account for day to day stuff.
Re:No (Score:2)
Not that this really makes any difference, out in the real world...
Re:No (Score:2)
Yes! (Score:4, Insightful)
Aside from malware that probably doesn't exist yet, it's still a good idea to have a window pop up or a console to prompt you for a root password because it lets the user know the action they take may harm their computer. It also hinders mistakes like deleting necessary files from happening accidentally. Security should be the main concern of a computer connected to a network or in an area more than one person can use. This enforces that concept and can greatly protect a computer than if it was always running as root.
Re:Yes!... NO! (Score:3, Informative)
1.) All the important, not easily recoverable files are typically in
Re:Yes!... NO! (Score:3, Informative)
Re:Yes!... NO! (Score:2)
I doubt there's much overlap between users capable of doing this and users likely to have malware on their machines.
Re:Yes! (Score:2)
This will be a hurdle for about as long as it takes malware writers to start modifying their software to not try and install system-wide. In other words, not long (once machines with non-admin users become widespread).
Services (Score:1)
Ubuntu got it right... (Score:5, Interesting)
Re:Ubuntu got it right... (Score:1)
osX (Score:2)
It's a design thing that requires a rare holistic view.
The best candidate to watch is osX but I'm not familiar with that
Re:Ubuntu got it right... (Score:2)
And how much file management do you have to do as root that makes it that important?
Re:Ubuntu got it right... (Score:2)
Re:Ubuntu got it right... (Score:2)
Quit with the Bevis laughter, already! I'm talking about "splat" in your /etc/sudoers.
Re:Ubuntu got it right... (Score:2)
Debian (parent)
Knoppix and Ubunto (both children of Debian)
Gnoppix child of Knoppix
Re:Ubuntu got it right... (Score:2)
In fact, Im not so sure that it was ever based on Knoppix, just inspired by it. It may have gotten its live-cd-ness from Knoppix, but its Gnome packages drirect from Debian (and now Ubuntu). That sounds like a plausable history, but its just a guess. Either way, today it is based on Ubuntu.
Re:Ubuntu got it right... (Score:2)
Sort of an anti-fork.
Re:Ubuntu got it right... (Score:2)
if you really must
Though any filemanagement you need root to perform
Alot of people dont realise the full potential of the shell for file management.
Re:Ubuntu got it right... (Score:5, Informative)
It doesnt seem right to me (Score:2)
stupid users will still type their passwords in when malware prompts for them, but that's more of a user education issue than anything.
Because telling them to have and use a separate root password, and why, isnt an user education issue?
To me this clever trick is actually a nice way to lose an opportunity to do such an education.
2 or 3 days ago, a newbye on a community forum for another user-friendly distro was complaining that he had to type
Re:Ubuntu got it right... (Score:2)
Believe me it is a pain in the ass for a first time Linux user that does not know the meaning of sudo. Of course the installation instructions do tell you to use sudo to do various things
When my installation screwed up, I had to start editing various configuration files and had no idea how to save changes. It took me a couple of hours browsing trough their forums and wiki to figure ou
Security and useability are closely tied. (Score:2)
If a lock is so hard to use it never gets used it's a bad lock.
stop thinking like an expert (Score:3, Insightful)
Maybe a lot of the demographic this distro is targeting doesnt even know what root is.
Plus, there is a saying (from the *BSD folk i think) "without physical security there is no security"
Get a bit of perspective, you need knowldege to have security, its not just a configuration issue.
Is it just me.. (Score:2, Insightful)
If you want it free, go with Ubuntu, If you want it cheap, go with Windows, and download freeware apps. It seems like Linspire users are paying just to use a second- rate distro.
Anyone care to enlighten me?
Re:Is it just me.. (Score:2, Insightful)
Well, it does have the advantage of not being Windows. ^_^
the other direction (Score:3, Informative)
When it comes time to actually use the files you downloaded, there should be a malware-scanning chown that checks the file is safe before assigning it over to you, perhaps on top of a check that firefox's chroot jail is not disturbed.
Re:the other direction (Score:1)
Re:the other direction (Score:1)
Re:the other direction (Score:2)
Bah. (Score:1)
Capabilities (Score:1)
The basic problem is that processes run with the full privilege of the logged in user. This violates the principle of least privilege. Why should your web browser be able to format your hard disk? Overwrite your tax documents? Why should your word processor be able to instantiate a network connection? It's not just access to files, it's access to serv
Mod me down but (Score:2)
I wish that would quit popping up every time Linspire turns a corner.
Ubuntu is a good example of the right way to do things I think. Root's there but you have to look up how to do it. However Linspire seems to have more things working for it. Unbuntu cant suspend on some machines, Linspire can, Unbuntu cant see my broadcom wireless card and getting my prism54 card going was tricky but in both cases Linspire
Oh no! Linspire gave Linux has a bad reputation! (Score:1)
Damage Linux's reputation?
Come on. Too many people care too much about rumors and "repuations" instead of getting the facts. People who seriously use and understand GNU / Linux know that scares like this are stupid, and that no operating system is secure by default: in order to secure your computer, you need to understand how it works yourself... you can't simply trust a company to secure it for you.
If anything, this will damage Linspire's reputation, not GNU / Linux's reputation. People probabl
Re:Oh no! Linspire gave Linux has a bad reputation (Score:1)
It only takes one linux distribution to be unsafe for certain marketing whores to start up the FUD machine and start cashing in on that piece of information. It may be disonest but that's the way marketing works. While the people on the know will laugh at the idea, the ignorant masses will read that linux, as a whole, is very insecure and move away from it.
The most popular desktop linux.... (Score:1)
How to make CA$H in 3 easy steps..... (Score:1)
2. ?!?!?
3. Profit.
Only M$ knows the answer to part 2.
Re:How to make CA$H in 3 easy steps..... (Score:1)
There is some wrong facts here ... (Score:1)
Clueless distro makers will fail (Score:2)
But it's not just the
Director/SW Architect logs in a root.... until... (Score:2, Funny)
But that was just the start...
Next thing were the permissions on the files/directories that he created. They were just wrong. We couldn't read some files he created that needed to be shared, we couldn't fix the permissions, we couldn't rename or move directories created by him. We couldn't even tell which w
Re:Director/SW Architect logs in a root.... until. (Score:1)
OOPS.... was meant to include Linus:
wizard - writes device drivers with "cat >"
- is on first-name basis with Dennis, Bill, and Ken (and Linus
Need for sudo education (Score:1)
I can only add... (Score:2)
Look at the false security of WinXP Home. "Oh, I'm not worried, I can't log in as Administrator unless I go to Safe Mode." So what? The average user's account is Administrator group by default and it's always root access. No end to the misery you can get into. Trojans can get total system access without their coders trying very hard at it. There's a reaso
Not quite. (Score:2, Interesting)
Re:Linux (Score:2)
Normal users can usually download, compile and use apps, and delete that which is theirs, but that doesnt meant they have access to install or delete code or configurations available to every user on the system.
Re:Linux (Score:1)
I think you'll find that in today's world there aren't that many people just sharing a 'slice' on a multi-user timesharing system. Heck, things have gone the opposite way. I have a 4 port KVM at home, and am wanting to upgrade to 8-way.
The user model for Unix is showing it's age. The way that i
Re:Linux (Score:2)
one account for my day to day use
one account set up for Oracle with different sets of administrators (essentially an Oracle root account)
one account set up for my wife. Looks much more Apple defaults
one account for my daughter (low privs)
a root account
a guest account
or my daughter's computer:
one account for me (administration)
the administrator account (higher privs)
one account for my wife (user account with pr
Re:Linux (Score:2)
Out of the box, the root account is locked out. You can't log in as root unless you type this:
sudo passwd root
Then it prompts you for your super user password, then asks you to reset root's password.
You can have sudoers on the system, but no root. Lin(are|dows|spire) could have done well to go with this model as well. Have no idea why they didn't.
Re:Linux (Score:2)
Re:What are the true risks? (Score:2, Informative)
The root account is for administering the system, installing and upgrading globally software installed globally on the system (for shared use), changing settings that effect users, managing, etc: root owns the system files.
Because root has access to bypass all security measures, it should not be used, except where necessary.
Suppose you surf the web as root: if you visit a malicious web site that exploits a bug in your browser, now your system is at their mercy.
If you had been following bes
Re:What are the true risks? (Score:2, Interesting)
If you had been following best practice and surfing the web as a normal user, a dirty hacker could still run code, but they could not wipe out your system without first gaining root.
A system which I can easily reinstall, unlike the personal data which, while it should be backed up, can't be relied on to be backed up every minute and shouldn't be accessed by someone else regardless. Root makes sense on a multi-user system from a sysadmin's point of view where the integrity of the system is paramount. A si
Re:What are the true risks? (Score:2)
> the personal data which, while it should be
> backed up,
But you *do* have the backups right?
> can't be relied on to be backed up every
> minute and shouldn't be accessed by someone
> else regardless.
If your work is worth of it - you should backup it every minute. It is just a matter of priorities...
> Root makes sense on a multi-user system from
> a sysadmin's point of view where the integrity
> of the system is paramount.
Not only, s
Re:What are the true risks? (Score:2)
I learned Unix on a DEC PDP-11/60, and then on a NeXT Cube - serial line all-the-way.
For years I build my Linux and OpenBSD boxes like I learned - half unconsciously thinking, "Better install emacs, too. Someone's gonna bitch if there's only vi. Hmmmn. There's a chance that the German man pages will be needed by a user, sooner or later..."
Of course, it was my personal Athlon! Noone was ever going to telnet on in, or kermit those files to another host! I didn't stop this builing/installing hab
Re:What are the true risks? (Score:2)
Says you. Most single users at home do not have the technical knowledge to reinstall the system. A root compromise means hiring a technician to resetup their computer AND losing all their data.
If root is not compromised the system is not compromised, only the individual user. If you run as root it isn't like the system is compromised but not your personal data.
Also on a single user system your personal data may or may not be all that critical. MOST home u
database filesystem (Score:2)
And this is one of the countless reasons that Lin
Re:database filesystem (Score:2)
Re:database filesystem (Score:2)
Re:database filesystem (Score:2)
You are right about free space. Its solvable if any of:
a) If you know what you are doing
b) You have lots of extra space
c) The OS provides a fairly good wizard for cleaning up space.
In general though user data should never be "perma deleted" while directories like
Re:database filesystem (Score:2)
Re:database filesystem (Score:2)
It would take a ton of time to compute a delta on 2 multi-gigabyte files. So you either:
a) Store them on fileystems which aren't versioned
b) Eat the extra cost because you want version
Re:database filesystem (Score:2)
Have you seen the size of a server required to even _run_ Oracle? It's a huge resource hog, and you want to build something like it into the operating system. Not to mention that you admit that the most optimized DB is still 3 times slower than a normal filesystem. Also, part of the reason it's so fast is because of aggressive caching. Sure, it runs fine on a dedicated server with 4 gigs of RAM.
The
Re:database filesystem (Score:2)
Re:What are the true risks? (Score:1)
Re: What are the true risks? (Score:2, Interesting)
Also, it's easily to accidentally trash the system configuration if you are operating as root when not necessary."
Yep, doing things as non-root user protects your system from getting screwed up, so that your system will keep working as expected, while your data (in your home directory) may get thrashed, deleted, or leaked/s
Re: What are the true risks? (Score:2)
I'm sure we would all like a security system that makes our checking data as secure at our home computer as at the bank and is easy enough for grandma to use but that is a pipe dream. Reality is that your computer is NOT a safe. When you connect that computer to the internet you have no reasonable expectation that t
Re: What are the true risks? (Score:1)
I wrote "Unix-style". Built my own Linux system from source ages ago a la Linux From Scratch [linuxfromscratch.org], waiting for next releases of NetBSD and FreeBSD to take these for a spin, and writing these comments from Gentoo Linux. Does that count?
Re:What are the true risks? (Score:2)
So they only have the ability to delete - or more insidiously, modify - the most important data on the machine ?
Right.
Re:What are the true risks? (Score:2)
* If a program crashes, it can overwrite any part of the drive at all, not just your home directory. This could mean it belches over your programs, or worse, your kernel, meaning your computer won't boot.
* If you run a malicious program (like a virus or trojan) it can make changes to the entire configuration of your system, infecting every program on your computer. Thi
Re:What are the true risks? (Score:1)
Indeed. They've made it almost as 'slick' as Windoze. I guess that's okay for the kind of people who don't hang out here.
Re:What are the true risks? (Score:2)
Stupid and ignorant people configure/make/make install with flags and so forth.
Intelligent ones take 2 seconds and a text editor to make a spec file that compiles the software per their specific requirements. Then they have a perfectly tuned binary whenever they have need for one that is
Re:What are the true risks? (Score:2)
Nor will you. RPM makes life easier for anyone who uses it effectively. You could manually clear out stale temp files on your system periodically as well. I prefer to write a script that automates this. After all, I sacrifice no flexibility since I am the one writing the script.
"And when I want to make a NetBSD package from source, I often use the 'make package' command and it makes a binary tarball for me."
Whatever floats
Re:What are the true risks? (Score:2)
I never claimed RPM was THE package management system so I will ignore your slander. You apparently aren't even reading my posts. You are advocating source management systems, I am advocating package management. RPM is a fine choice of container format (one that has come a long way since the
Re:What are the true risks? (Score:2)
Yeah, like it's really hard to reimage your hard drive. The Lindows people rightfully pointed out that the most valuable thing a typical user has is his documents, and those aren't protected at all with the UNIX security model.
* If you run a malicious program (like a virus or trojan) it can make change
Re:What are the true risks? (Score:2)
Ok, explain to me how you write garbage all over the BIOS, or mark blocks as bad on your hard-disk, etc as a normal user?
Root not only has the potential to render the O/S un-usable - it has hardware level access as well.
Not quite so easy to re-flash your bios when your PC won't
Re:What are the true risks? (Score:2)
You can't fuck up the bios from the OS to the best of my knowledge -- even as root. If you can, that should be disabled pronto because there is no legitimate reason to write to the bios from within Linux. In any case, there have been very few viruses that managed to mess with the BIOS -- it's pretty hard.
As far as bad blocks all over the hard drive: did you miss the bit about reimagi
Re:What are the true risks? (Score:2)
Re:What are the true risks? (Score:2)
We know damn well why not to run as root.