Trouble Logging In as Root

Mark Haney mhaney at ercbroadband.org
Mon Nov 10 15:14:48 UTC 2008


Nils Kassube wrote:
> Mark Haney wrote:
>> CLIFFORD ILKAY wrote:
>>> Ignore the advice to set a root password.
>> NEVER leave root without a 
>> password.  PERIOD.  
> 
> Why do I need a root password if the root account is locked? Clifford 
> didn't advise to use a blank password but to leave the root account 
> locked.
> 
>> This is not only probably the biggest security hole 
>> ever, it's just plain wrong.  Root is (in the phrasing of Ric Flair)
>> 'THE MAN'.  It can do everything.  Anyone leaving root exposed runs a
>> big risk.
> 
> Then it is even better to have no root password set with but keep the root 
> account locked to reduce the exposure, or am I missing something?

Locking the root account is fine, even preferred, but leaving it 
'unlockable' and with an empty password is stil (IMHO) a bad idea.  I've 
never preferred locking it WITHOUT a passwd.  Again, my advice, be 
paranoid.

> 
>> I am aware of the fact that Ubuntu gives sudo access to virtually
>> everything for the first user, 
> 
> But you don't seem to be aware that the root account doesn't have a blank 
> password but we have a locked root account. You simply can't login as 
> root unless you intentionally set a root password.

I am aware, but that still is only part of the problem, with sudo access 
you can unlock root, and still make yourselves even more vulnerable 
without a hard to crack passwd.  Sure, if the primary user is 
compromised, you're screwed anyway, but the point here is never do just 
one or the other.  Do both.  Of course, this only comes with experience, 
I've had that happen to me once.  Long ago.  But hey, it's your system. 
  Do what you want, I'm just offering my experiences in the past.  Never 
assume locking root is enough.


> 
>> but let's examine the possibilities 
>> here. Let's say I compromise your system's primary user account. I can
>> sudo into root, then lock everyone else out with a couple changes to
>> sudo using visudo as well as edit the root passwd.  What do you do
>> then? You're busted.  Period.  There is no real recovery from that,
>> because even with a rescue CD you pretty much need to know the root
>> passwd. 
> 
> Why that? I use the Ubuntu LiveCD and can easily get a root shell 
> with "sudo su". Then I can mount the HD of the compromised system and 
> make changes to get access again.

Sure, yeah, that works but only when you have the LiveCD with you.  I 
personally either a) don't always carry boot disks with me or b) am too 
far away from said system to use one.  Sure, I carry around a bootable 
flash drive that can work, but I don't always carry it with me.  Again, 
my advice, never assume you'll have one with you, or be close enough to 
the system to use it.  Trust me, when the poop hits the fan, you're 
almost always missing something that would make life easier on hand with 
you.  (Unless you're Macgyver, then it's open season.)



> 
> 
> Nils
> 


-- 
Frustra laborant quotquot se calculationibus fatigant pro inventione 
quadraturae circuli

Mark Haney
Sr. Systems Administrator
ERC Broadband
(828) 350-2415

Call (866) ERC-7110 for after hours support




More information about the ubuntu-users mailing list