On Wed, 2002-08-21 at 18:53, Eric Robinson wrote:
> 
> It seems to me that removing fodder for brute-force password guessing
> programs would be a good thing

Yeah, spare accounts that can be logged in to are bad.

> and so would removing accounts for services
> that I don't use or need. 

How?  An entry in the password file that has no password is nothing more
than a label corresponding to a UID.  The likely outcomes of removing
the accounts include, among other things:
* Some rpm installation may fail in the future because a required user
doesn't exist
* Some daemon may fail to start because its user doesn't exist.
* You may find a file that was owned by one of those users, and be less
able to identify its purpose without the username, or rpm may begin to
complain about those files during package verification.
* You may mount an NFS volume and be unable to identify the owner of a
file on the remote server.

And on the other side:  nothing.  There's no positive benefit from
removing the users.  Why bother?

> My question, really, was whether I can safely delete these accounts.

Maybe.  That's about as good as it gets.  Some you might be really sure
that you'll never use, like "gopher", but others you might be unable to
predict your need for, like "daemon" or "adm".

> FYI, I have forwarded your message to Gerhard Mourani, author of "Securing
> and Optimizing Linux, Red Hat Edition - A Hand's On Guide." It was from
> section 5.13 of that 400+ page tome that I received the suggestion to delete
> those standard accounts.

Yeah... that portion of the document has been discussed on these lists
before.

> I am naturally curious to hear his response to your
> assertion. Since I note that you are a veteran of computer security (I've
> seen your gspot patch on packetstorm)

buahahahaaha
Oh, crap... I thought that'd been forgotten  :)   Occasionally I show
that program to people for a laugh.  When I wrote that, I showed it to
my boss... He said I'd created "an incredibly powerful hacking tool",
but I'd never have gone that far.  gspot does not qualify me as a
veteran of computer security  :)

> I am willing to believe that either
> of you could be right. For my part, I'm just the hapless sysadmin caught
> between conflicting rules of best practice. At the moment, I am still
> leaning toward implementing Gerhard's suggestion.

Well, if he can produce a compelling argument, I'm more than willing to
listen to it ;)




-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to