Results 1 to 10 of 10

Thread: passwordless non-administrative user = hazard?

  1. #1
    Join Date
    Mar 2008
    Location
    Copenhagen Denmark
    Beans
    722
    Distro
    Ubuntu 11.10 Oneiric Ocelot

    passwordless non-administrative user = hazard?

    My computer has another user without administrative rights.

    I used
    Code:
    sudo passwd -d 'user'
    but it made me think about the possible security hazards doing so.
    Is it bad or not?

    btw. I am normally a pretty paranoid Ubuntu'er

    these are the password-less user's permissions.

    Ubuntu 10.10 Maverick | ASUS A6Rp | Intel(R) Celeron(R) M CPU 420 @ 1.60GHz | 4 GB ram |
    Graphic Card: ATI Technologies inc RC410 [Radeon Xpress 200M]

  2. #2
    Join Date
    Nov 2006
    Location
    40.31996,-80.607213
    Beans
    Hidden!
    Distro
    Ubuntu

    Re: passwordless non-administrative user = hazard?

    Are you running SSH or FTP?
    Generally it is not a wise idea for a passwordless account, but if it can not do much, then there isn't much of a risk.
    "Security lies within the user of who runs the system. Think smart, live safe." - Dr Small
    Linux User #441960 | Wiki: DrSmall

  3. #3
    Join Date
    Mar 2008
    Location
    Copenhagen Denmark
    Beans
    722
    Distro
    Ubuntu 11.10 Oneiric Ocelot

    Re: passwordless non-administrative user = hazard?

    eeerhh.. how do I know?

    edit: is this what you mean?

    Last edited by jakupl; May 2nd, 2008 at 02:35 AM.
    Ubuntu 10.10 Maverick | ASUS A6Rp | Intel(R) Celeron(R) M CPU 420 @ 1.60GHz | 4 GB ram |
    Graphic Card: ATI Technologies inc RC410 [Radeon Xpress 200M]

  4. #4
    Join Date
    May 2007
    Beans
    7,032
    Distro
    Ubuntu 9.10 Karmic Koala

    Re: passwordless non-administrative user = hazard?

    Quote Originally Posted by jakupl View Post
    eeerhh.. how do I know?
    According to your first screen shot, the user doesn't have sudo privileges. The only area for concern (in the unlikely event that this account got compromised by a remote attacker) is the modem privileges. If you have a dial-up modem, this account has the permissions to use and configure it. Meaning that an attacker could potentially dial up a 900 number and run up your phone bill.

    Apart from stuff like that, the only threat would be to this user's own files (usually, anything in its home directory). Basically, anything that this user can do could also be done by a remote attacker.

    edit: is this what you mean?
    That's just the default shell environment for that user. In other words, when you open up a terminal emulator while running this user, you get a Bash environment, rather than zsh, dash, csh, python, or any other shell. Nothing to do with security, really.
    I am aware of all internet traditions. | Getting the best help | Text formatting codes | My last.fm profile
    Should I PM support questions? NO!

  5. #5
    Join Date
    Mar 2008
    Location
    Copenhagen Denmark
    Beans
    722
    Distro
    Ubuntu 11.10 Oneiric Ocelot

    Re: passwordless non-administrative user = hazard?

    great in that case, yeah. shell.

    thanks, but would it not be easier for a potential hacker to access the administrator account if he already had accessed the other account?
    Ubuntu 10.10 Maverick | ASUS A6Rp | Intel(R) Celeron(R) M CPU 420 @ 1.60GHz | 4 GB ram |
    Graphic Card: ATI Technologies inc RC410 [Radeon Xpress 200M]

  6. #6
    Join Date
    Dec 2006
    Location
    Chicago
    Beans
    3,839

    Re: passwordless non-administrative user = hazard?

    I think it compromises a layer of security. Ideally, you would want to prevent access to any unauthenticated remote users. If a remote user gained limited access to your machine, I think it would be easier to compromise your system if you have a privilege escalation vulnerability. This is why ssh doesn't permit empty passwords by default. If you don't run any other servers, I don't think it would be an issue.

  7. #7
    Join Date
    Mar 2008
    Location
    Copenhagen Denmark
    Beans
    722
    Distro
    Ubuntu 11.10 Oneiric Ocelot

    Re: passwordless non-administrative user = hazard?

    well... today this account started behaving a bit strangely, It wouldn't let me log on, so I just gave it a password. Problem solved
    Ubuntu 10.10 Maverick | ASUS A6Rp | Intel(R) Celeron(R) M CPU 420 @ 1.60GHz | 4 GB ram |
    Graphic Card: ATI Technologies inc RC410 [Radeon Xpress 200M]

  8. #8
    Join Date
    Sep 2007
    Location
    Idaho
    Beans
    473
    Distro
    Xubuntu 10.04 Lucid Lynx

    Re: passwordless non-administrative user = hazard?

    If you have an SSH daemon running, don't even think about having any user without a password. Especially since the account name is something fairly obvious, user. If someone got in with that account, they could use the SSH connection as a tunnel to do illegal things -- not to mention damage your box.

  9. #9
    Join Date
    Dec 2006
    Location
    Chicago
    Beans
    3,839

    Re: passwordless non-administrative user = hazard?

    Quote Originally Posted by lespaul_rentals View Post
    If you have an SSH daemon running, don't even think about having any user without a password. Especially since the account name is something fairly obvious, user. If someone got in with that account, they could use the SSH connection as a tunnel to do illegal things -- not to mention damage your box.
    From the default /etc/ssh/sshd_config
    # To enable empty passwords, change to yes (NOT RECOMMENDED)
    PermitEmptyPasswords no
    Unless he changes this setting, I don't think that would be possible.

  10. #10
    Join Date
    Sep 2007
    Location
    Idaho
    Beans
    473
    Distro
    Xubuntu 10.04 Lucid Lynx

    Re: passwordless non-administrative user = hazard?

    Quote Originally Posted by cdenley View Post
    From the default /etc/ssh/sshd_config


    Unless he changes this setting, I don't think that would be possible.
    Because vulnerabilities and exploits don't exist.

    I get what you're saying, but I wouldn't risk it. Let's say you have a daemon that you don't need running (think ipp or such). Who cares if you add an iptables rule to block that port? Why not just stop the daemon? If you have an unneccessary opening in your fortress, it's far more secure to rebuild the wall then to stuff a little plaster in the hole.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •