1996-09-01 - Re: Moscowchannel.com hack

Header Data

From: ichudov@algebra.com (Igor Chudov @ home)
To: markm@voicenet.com (Mark M.)
Message Hash: 67951aa5d24389cd2d25de0f9d18890cb4a6640bfe96e4b5fd3933d213c1a8c5
Message ID: <199609012149.QAA00600@manifold.algebra.com>
Reply To: <Pine.LNX.3.95.960901141631.186B-100000@gak>
UTC Datetime: 1996-09-01 23:38:52 UTC
Raw Date: Mon, 2 Sep 1996 07:38:52 +0800

Raw message

From: ichudov@algebra.com (Igor Chudov @ home)
Date: Mon, 2 Sep 1996 07:38:52 +0800
To: markm@voicenet.com (Mark M.)
Subject: Re: Moscowchannel.com hack
In-Reply-To: <Pine.LNX.3.95.960901141631.186B-100000@gak>
Message-ID: <199609012149.QAA00600@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Mark M. wrote:
> > A hacker who has root can forcibly unmount the cdrom and mount another
> > directory on that node. Not a good solution.
> 
> As soon as the sysadmin finds out, said directory can be unmounted and CD-ROM
> device can be remounted.  Besides, if someone manages to get root access on any
> machine, the sysadmin of that machine is basically screwed anyway.  It's much
> better than having to back up the web page on a tape and having to restore the
> data when it is altered.

It depends on the ratio 

   R = (frequency of legit Web page changes) / (frequency of breakins 
                                                * cost of a breakin).

The lower is R, the more what you say makes sense. I suspect that 
in the real world R is rather high.

	- Igor.





Thread