LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Linux From Scratch
User Name
Password
Linux From Scratch This Forum is for the discussion of LFS.
LFS is a project that provides you with the steps necessary to build your own custom Linux system.

Notices


Reply
  Search this Thread
Old 12-03-2003, 03:31 PM   #1
cbarnes913
LQ Newbie
 
Registered: Apr 2003
Location: Upstate New York
Distribution: Working on LFS
Posts: 13

Rep: Reputation: 0
Root user


Exactly how much impact does the root user have on the system? When I say that, I mean, how often is something hardcoded into a program that refers to the root user?

The reason I ask is this:
While reading through chapter 6 in LFS5 about creating the passwd and group files, I began to wonder if it was possible to create the root user as some other username than "root". I could simply name the user who is uid:0 groupid:0 to something else.

Possible pros for this:
It would be harder for a person to get root access to the system without knowing the root username. It forces a person to need both the username and the password, instead of just the root password.

Possible cons:
My worry is that some program is going to give access rights to something to the user "root" that will not exist. A possible solution would be to create a restricted user named "root", which maybe creates a tease to someone who finds the password to root, but doesn't really have root access over anything. Additionally, this root would own anything that a program gives ownership to thinking it is the true root user.

I guess it all comes back to my original question: How many programs actually contain code that refers to the root user as the name "root"?

I guess the major major question is, will a system function with the 0:0 user as something other than "root"?
 
Old 12-03-2003, 04:09 PM   #2
ferreter
Member
 
Registered: Oct 2002
Location: USA, IL
Distribution: Debian/Gentoo/Slack
Posts: 215

Rep: Reputation: 30
If I'm not mistaken most well coded programs will utilze the uids and guids rather than hard code the root string. But im not an expert coder.
 
Old 12-03-2003, 07:22 PM   #3
cbarnes913
LQ Newbie
 
Registered: Apr 2003
Location: Upstate New York
Distribution: Working on LFS
Posts: 13

Original Poster
Rep: Reputation: 0
That's what I would think too, but I keep thinking that I read in the LFS5 book that a well coded program uses the name. I can understand using the uid for root to consider uid 0 as the root user all the time, but when you use the uid for any other users (and correct me if I am wrong) when a user is deleted and another is added, that user could have the same uid as a previous user, which would be bad if ownership rights are to a user id instead of a name. But I am a novice to linux at best, so I could be way out in left field.
 
Old 12-03-2003, 09:25 PM   #4
trickykid
LQ Guru
 
Registered: Jan 2001
Posts: 24,149

Rep: Reputation: 270Reputation: 270Reputation: 270
One reason not to do this:

Security thru obscurity doesn't always work!
 
Old 12-06-2003, 01:17 PM   #5
fr0zen
Member
 
Registered: Nov 2003
Location: 127.0.0.1
Distribution: xubuntu
Posts: 217

Rep: Reputation: 30
But isn't that the basis for forming a strong password? Making it obscure? I think obscurity is a basic form of security. Of course it isn't enough on it's own. It's just a basic form.

If you're going to make an obscure password, why not make an obscure 0:0 login account?
 
Old 12-10-2003, 09:09 AM   #6
cjcuk
Member
 
Registered: Dec 2003
Distribution: Openwall, ~LFS
Posts: 128

Rep: Reputation: 15
The reason that this is often fairly fruitless is that the most common attack vectors do not require a user to know the account name of uid(0). Most compromises happen through exploiting processes that give the user uid(0), e.g. a buffer overflow in a daemon that is running as uid(0). Actual attacks based upon entering the root username and password are fairly rare. This is because, unless they already have root and can view the hash and salt in the shadow file, the user would have to guess a random password that will have many permutations. Due to constraints that non-local access would place on this process, I would assume that most attacks of this type are local attacks - at which point catting the passwd would reveal the root username anyway.

As for the obscurity notion, yes a password is security through obscurity - this is why it has the obvious weakness that anyone can type it. However, it is one of the few instants that really add a lot of weight from obscure measures. The idea is to replace security through obscurity, with systems that are so secure the user can know all of the implementation details and still not break it. Security through obscurity works on a user no knowing a piece of information, but the assumption that the user can not find or guess this information is usually flawed.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Help! Cannot Add a User to User Manager or Change Root Password lennysokol Linux - General 2 06-25-2005 09:59 AM
Scanner to work as USER and not forced as ROOT Root (Suse 9.1) 1kyle Linux - Hardware 0 07-10-2004 08:51 AM
Games runs slow as normal user, but fast as root user mcore Linux - Software 2 06-07-2004 11:11 PM
IntelliMouse thumb buttons work as root, broken as non-root user, wheel works always digital vortex Linux - Hardware 7 03-02-2004 04:14 PM
Why does kppp.desktop require root userid for non-root user? rdaves@earthlink.net Linux - Networking 4 08-27-2001 09:18 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Linux From Scratch

All times are GMT -5. The time now is 05:54 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration