At 4/10/01 08:49 AM -0500, you wrote:
>On Mon, 9 Apr 2001, Thomas Duterme wrote:
> > We've also got a private net for the same servers with a
> > dedicated line from the IDC to the company.  Currently,
> > telnet is enabled on that network.  (mainly for ease and to
> > eliminate the need for key distribution among all company
> > machines)
> >
> > Question to the list: is there anything *wrong* with this
> > picture.  Can you criticize this setup from a
> > security point of view.  Specifically interested in hearing
> > what people have to say about the private network telnet
> > access.  (note: the private names/Ip's are not publicly
> > available via DNS - ie using a split DNS atmosphere)

I read that something like 80% of companies that detected security breaches 
found inside involvement--employees who got social-engineered, who were 
mad, who were curious, who were careless, who were stealing, whatever. 
You're operating on the assumption that you can trust your users, which is 
(probabilistically) wrong.

Install SSH internally, and, since you wanted to avoid key distribution to 
all machines, just use password authentication. You'll have gained a great 
deal since passwords and session data will now be encrypted as opposed to 
clear text, and you'll put forth darn near zero effort. But remember that 
those best able to screw you are those who are already close to you.


--
Rodolfo J. Paiz
[EMAIL PROTECTED]



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to