LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-29-2012, 06:30 AM   #1
ecataranciuc
LQ Newbie
 
Registered: Jul 2012
Posts: 12

Rep: Reputation: Disabled
System authentication: password + USB stored hash?!


Hello!
I am interested in different ways to secure Linux machines (enterprise, banking ... grade). How secure gets a system when using the method described in the title? Does it really make sense in a network context?
Thank you!

Last edited by ecataranciuc; 07-29-2012 at 06:31 AM.
 
Old 07-29-2012, 07:02 PM   #2
chrism01
LQ Guru
 
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.2
Posts: 18,368

Rep: Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753
Depends exactly what scenario you have in mind, but there are 3 classes of auth:

1. something you know: username, password, ...
2. something you have: usb key, RSA token, OTP, ...
3. something you are ie biometrics

None of that stops you downloading malware once you've logged in though ...
 
Old 07-30-2012, 03:22 AM   #3
ecataranciuc
LQ Newbie
 
Registered: Jul 2012
Posts: 12

Original Poster
Rep: Reputation: Disabled
Thank you for the reply.
How difficult it gets to crack a system which requires a password and a token in order to authenticate? I am talking about network and/or local cracking. What are the best methods to secure a system?

Last edited by ecataranciuc; 07-30-2012 at 03:32 AM.
 
Old 07-31-2012, 12:02 AM   #4
chrism01
LQ Guru
 
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.2
Posts: 18,368

Rep: Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753Reputation: 2753
Well, there are tons of resources on the web about security, and see the Stickies here, but in short:

1. local; all bets are off if they have physical access, unless you have encrypted your files properly....

2. remote: well, you would need to use a secure cxn eg ssh, vpn etc.
again, the quality of the encryption is vital, as are not using easy passwds.

You should read up on ssh, vpn, pam, ssl, OTP, etc etc.
General answers are tricky; specific problems are easier (sort of) to answer.
 
1 members found this post helpful.
Old 07-31-2012, 02:16 AM   #5
ecataranciuc
LQ Newbie
 
Registered: Jul 2012
Posts: 12

Original Poster
Rep: Reputation: Disabled
Got it! Thank you!
 
Old 07-31-2012, 12:35 PM   #6
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,679
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
Here's a short-answer: this is a problem that has already been solved. LDAP (a.k.a. OpenDirectory) and Kerberos are two typical methods that are used on an enterprise level. Their security characteristics are well-known, as are their centralized system management tools. You can now "log in" (authenticate...) to any computer that you are authorized to use, and to access any internal web-site or application or what-have-you that you are authorized to use. The processes of both authentication and authorization are done one way no matter who's doing it, and they're controlled in one way no matter what type of system is referring to it. Logging and auditing are also handled in a known and consistent way.

Both the design and the implementation were done openly, and by qualified experts in the field. Their work has been peer-reviewed and studied for years since; and it's still going on. You don't need to understand how the vehicle works in order to climb aboard.

If you've got 3,500+ users who need to hit 960 servers ... as one client of mine does ... believe me, that's a big deal.

You don't want to "roll your own solution" when there is any security infrastructure available that you can hop-a-ride with instead.

Last edited by sundialsvcs; 07-31-2012 at 12:37 PM.
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Creating password hash. knockout_artist Linux - Newbie 4 11-04-2009 06:49 AM
password hash evil_empire Linux - Security 4 04-25-2009 07:16 AM
Restoring Password Hash zok Linux - Server 3 04-29-2008 12:22 PM
What type of password hash is this ? memo007 Linux - Security 7 12-26-2007 02:34 AM
Password Hash Query aml1973 Linux - Security 1 12-03-2007 07:50 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:52 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration