dangtri: (Default)
[personal profile] dangtri
  • 21:32 WTF security: Solaris cluster access is restricted to a gateway via two-factor auth. Then su to a shared user that's root on the cluster. #
  • 21:50 Interesting how many candidates when asked "how does the sending MTA know what MTA to connect to" re-invent the /etc/hosts file. #
  • 22:30 @jemimakiss Cmd-Shift-arrow keys,. I find it annoying that it's non-standard. or are the others non-standard? #
  • 22:58 11pm -- time to sign off and *go*home*. enough worked for 1 day. #
Automatically shipped by LoudTwitter

Date: 2009-02-12 04:00 pm (UTC)
bigmacbear: Me in a leather jacket and Hockey Night in Canada ball cap, on a ferry with Puget Sound in background (Default)
From: [personal profile] bigmacbear
@21:32: Actually that could kind of make sense, depending on how anal-retentive the logging is on the gateway. The Achilles' heel of Unix security is that so much system work must be done as root, and being able to capture who was logged into the system as root while maintaining a second log which the admins can't hack into (as they cannot be prevented from hacking the local logs once they become root) is rather of a good thing. One such tool is PowerBroker.

Of course, legal constructs like Sarbanes-Oxley in the US and the Payment Card Infrastructure contractual requirements worldwide have pretty much eliminated any sense of trust from the IT environment. Pity.

July 2010

S M T W T F S
    12 3
456 7 8910
11 12 1314151617
18192021222324
25262728293031

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 28th, 2026 11:19 pm
Powered by Dreamwidth Studios