TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Non-repudiation and the joy of knowing you've been hacked

33 pointsby Vaismaniaalmost 12 years ago

8 comments

quanticlealmost 12 years ago
I think the author is missing the real problem. Why is there a single "admin" account at all? Why don't users log in with their "normal" user accounts, and then use some kind of authenticated, audited privilege escalation (like sudo, for example) to perform tasks that require administrative privileges?
评论 #6098914 未加载
sehropealmost 12 years ago
&gt; Which brings us to shared accounts. Having worked with hundreds of companies over the past couple of years, we&#x27;ve learned that shared accounts are ubiquitous, specially for infrastructure accounts (if your company uses SSH, chances are you have one Unix Login that all your admins&#x2F;employees share). Which makes non-repudiation harder.<p>I&#x27;ve seen this first hand at a number of large companies for both unix accounts and (even more so) with database accounts. After some period of time (varies from 1 month to 1 year) everybody who worked on an application would have the database credentials of the application and would use them to diagnose app issues. New members of the team for an app would be given all the credentials too as &quot;it&#x27;s the only way to get things done...&quot;.<p>It wouldn&#x27;t start out that way as things would be &quot;locked down&quot; at first but <i>every</i> app ended up like that. Add to this that folks tend not to ever rotate their application database passwords for fear of breaking something and you&#x27;ve got a ton of people with the same access credentials and no way to distinguish them. People would join&#x2F;leave the group (or even the company) that managed an app and would forever have access to all the databases for the app[1].<p>This is one of the problems that we&#x27;re solving with JackDB[2](<i>disclosure: I&#x27;m the founder</i>). It allows you to share data sources without sharing passwords. User&#x27;s authenticate as themselves and the server proxies the database connection for them. All executed commands (SQL, etc) are added to an audit trail and since you can tie actions to actual users you know who made changes, who queried customer records etc. Similarly since access is done <i>per user</i> you can selectively grant&#x2F;revoke access to user&#x27;s without asking them to &quot;forget&quot; old credentials.<p>[1]: Yes firewalls can block things as well but if you&#x27;re still an employee somewhere then you can probably get passed the internal firewall by tunneling through some other server you have access to.<p>[2]: <a href="http://www.jackdb.com/home.html" rel="nofollow">http:&#x2F;&#x2F;www.jackdb.com&#x2F;home.html</a>
评论 #6098039 未加载
评论 #6098029 未加载
trotskyalmost 12 years ago
The idea that a serious compromise will present a clear path back to a specific ssh key that got used by the attackers and that you&#x27;ll possibly be able to stop it just by turning off that key is pretty laughable. But then again, so is protecting your core infrastructure with 1.5 factor android soft tokens. Google isn&#x27;t even willing to make it sound like especially strong protection for your gmail account. How much for a CAC style pki infrastructure? Hard to believe it&#x27;s more than $50-$100&#x2F;seat for a small organization. If you&#x27;re worried about figuring out which employee got his phone dropped after your whole backend got molested perhaps an actual security posture would be more suitable.
评论 #6097691 未加载
danedalmost 12 years ago
Why do so many people need access to this &#x27;admin&#x27; account. Is this an infrastructure problem? I&#x27;m struck by the idea the author is discussing how to properly share access to a single account on an OS that was conceived as multiuser.
_kst_almost 12 years ago
&quot;if your company uses SSH, chances are you have one Unix Login that all your admins&#x2F;employees share&quot;<p>Is that really common? I&#x27;ve never seen it.
评论 #6097860 未加载
评论 #6098220 未加载
评论 #6097811 未加载
评论 #6097808 未加载
bcoatesalmost 12 years ago
Does obtaining the original Google authenticator QR code actually let you impersonate the authenticator? I was hoping it was a one-time shared secret only used for the authenticator to identify itself to the server for bootstrapping purposes and that a used QR code would be worthless.
评论 #6097644 未加载
评论 #6099082 未加载
threepipeproblmalmost 12 years ago
Doesn&#x27;t non-repudiation mean the opposite of what he is saying? I.e. isn&#x27;t &quot;being able to proof where something comes from or who did what&quot; just repudiation?
评论 #6099420 未加载
telalmost 12 years ago
How should we store passwords? IAM is clearly a big industry for big companies, but lots of people have the problem. There has to be a simple solution?