Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] can one safely login multiple times to the same user on a modern Linux desktop?



On Fri, Sep 07, 2012 at 07:52:28PM -0400, Rich Pieri wrote:
> I have an even better example: Active Directory with roaming profiles.
> Active Directory is MIT Kerberos + LDAP + DNS, the same authentication
> system used by Athena. 

Horse be damned, I think you're still missing the point.  It's what
you're protecting, how accessible and available it is, and it's value,
that matters... not so much what solutions you're using to protect it
(unless they're just plain inappropriate for the job).  

To put it more plainly:  It doesn't matter if another user can access
my NFS directories, if all I have there are some photos from my
vacation in Honolulu, and copies of data they already have access to.
For that attack to be interesting, there needs to be something there
that the user shouldn't have access to, which has sufficient value for
them to try to get at it, AND real cost/consequences if they succeed;
and there needs to be no easy way to thwart the attack you described.
In most environments, you typically don't have the former, because all
your coworkers will likely have access to the same bits; and I already
explained a couple of ways how to do the latter.  Make sure their
directories have suitable permissions (well within your power), make
them use vlock when they leave their workstations (or disable all but
one VC), and be done with it.  Logging out is needlessly obtrusive and
costly in comparison, and no more effective.

So again, unless you're working on datasets that are highly sensitive,
which most of us are not, this concern simply isn't.  Your policy of
logging out doesn't help here, because there's nothing requiring help.
If you want to see the code I'm working on, just check it out
yourself.  If you want copies of my vacation photos, just ask...  I'll
send them along.  =8^)

And if you ARE working on sensitive datasets, you'd better take your
physical security more seriously, cuz if you don't you've already
failed.  And you'd better get yourself some better segregation of
resources, to make sure that those who shouldn't have access can't
walk up unchallenged to the workstation of a coworker who does and get
it.  If you can't afford to make that happen, chances are the data
you're trying to protect isn't as valuable as you think it is.  If
you're worried about the cleaning people, you have a different
problem, requiring a very different solution.  

If you're doing it right, this "log out when you walk away" business
is nothing but annoying small potatoes.  It's like the TSA: giving the
appearance of security by being annoying and obtrusive.  

> If you think that the horse has been flogged to mush then I'll leave
> you with this rhetorical question: would you trust a Windows login
> session to the screen lock?

I'll answer anyway:  I do not trust Windows for anything more serious
than playing games, period.  And actually I don't really even trust it
for that.  But I use it anyway for certain things, because the cost of
alternatives (like playing games on other platforms for which no
supported port exists) is too high (mostly in terms of the work I need
to put in to get/keep it working), or because there are no viable
alternatives.  The same basic principle applies:  Avoid evil unless it
can not be avoided; in that case choose the least evil (the solution
with the lowest cost, or no solution if the cost is higher than the
risk).

That said, if the overall site security is up to the task, then yes, I
would trust a windows session to a screen lock.  Because no one who
shouldn't have physical access will, and if someone does get
unauthorized access to something suitably sensitive, you'll have
sufficient monitoring in place to catch them and do something about it.  
And all without bothering your users unduly or significantly impacting
their productivity.

-- 
Derek D. Martin    http://www.pizzashack.org/   GPG Key ID: 0xDFBEAD02
-=-=-=-=-
This message is posted from an invalid address.  Replying to it will result in
undeliverable mail due to spam prevention.  Sorry for the inconvenience.




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org