2009/10/22 Paul Roach <roa...@roachy.net>:
> [snip]
>
> If possible, only permit key based login using SSH as well - this will
> completely remove the risk of password based attacks....
>

This is a very good idea but it's not always sufficient, as Apache
recently found out.

In their case, a third-party webserver got compromised, but it had
accounts that had SSH keys to enable backup of apache servers. The SSH
config on these password-less SSH keys allowed all commands, not just
the backup commands.

The attackers managed to alter the data on a staging server and then
the automated backup copied it into production!

To their credit, they did a full investigation and made all the
results public here
https://blogs.apache.org/infra/entry/apache_org_downtime_report

HTH
Cofion/Regards,
Neil.

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.ubuntu.com/UKTeam/

Reply via email to