On Sat, 2007-17-03 at 00:12 +0900, Arwyn Hainsworth wrote:
> On 16/03/07, Peter Whittaker <[EMAIL PROTECTED]> wrote:
> >
> > UC3:    Fritz is setting up a classroom or other contained environment,
> >
> > UC4:    Barbara is a security researcher setting up a honeypot.
>
> I fail to see why UC[34] would require unauthenticated access.

In Barbara's case, unauthenticated access is required because she
*wants* the box to be vulnerable, at least via this vector: She is
setting up a honeypot, she wants attackers to get in (at least part
way). Given she's a security researcher, she can probably hack the code
to do what she wants, so UC4 may be off the table.

In Fritz's case, it is common in training groups to enable a classroom
using crash-and-burn all-access-allowed machines: You image the machines
from disk, let the class have at 'em, then re-image them when the class
is over. Yes, completely open access means the students can mess around,
but there is little risk to this because a) the machines are being
re-imaged after class, and b) whose time are they wasting by messing
around? They have better things to do. (My experience in this area is
mostly with corporate training: the students - professionals who have
chosen to take the training or been voluntold - are too busy doing what
they are there to do to play hacker.) Sure, there is some risk of a
wannabe disrupting things, but it's low and would tend to be caught by
the other students.

In general, I run my machines at a higher level of security than most
people: I'm cynical, paranoid and a security consultant*. I'm also
absolutely opposed to being told what to do and how to use my machine.
So I'm ethically inclined to UC3, because it is somewhat paternalistic
to be otherwise.

Somewhat... ...there is always the question of whether or not one wishes
to give someone enough rope to hang themselves. Me, I believe in
education: "This is a really bad idea, most of the time. Are you sure?
Click Yes to disable authentication, click No to leave things as they
are (recommended), click Here to learn more...."

That said, UC3 is a wishlist item, and the person doing the work has to
be convinced of its value....

(*) As a consultant, my role is tell people what the threats and risks
are, and to let them make the decision - mitigate or accept. My role is
never to hector, never to badger, and always to believe, fundamentally,
that my clients are willing and able to make rational, informed
decisions.

pww

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss

Reply via email to