Sponsored Content
Full Discussion: IRC and Root
Top Forums UNIX for Dummies Questions & Answers IRC and Root Post 60821 by locustfurnace on Saturday 22nd of January 2005 12:41:48 PM
Old 01-22-2005
Quote:
Originally Posted by 9613315400
t
But how could a user over the internet make a script, and let it run onto my PC, unless i run it by myself??
Someone could DCC something to you on IRC.
If the IRC client has a discovered exploit, and if someone issues a CCTP, finger, whois...etc, to you, instead of getting information about your account, the exploit could be made to run a system command, causing damage to your system.
All the known issues today never means tomorrow something will not be discovered which could be extremely damaging.
Running as root may be OK today, but tomorrow a discovered hole in a program could be used to attack your system. Not all discovered holes in software code are public knowledge either.
If your box becomes compromised, then it could be used as a zombie to partake in further attacks.
This undermines one of the reasons to use GNU/Linux, is its security.
Is there really a reason you must be a logged in as root?
 

7 More Discussions You Might Find Interesting

1. Post Here to Contact Site Administrators and Moderators

Irc??

hi there everybody.. i just noticed that there is no forum dedicated to internet relay chat (IRC)... although there are several threads focused on this, i think it is quite better if there is a forum where questions on IRC are tackled head-on in a purely academic level... anyway, this is just... (4 Replies)
Discussion started by: cable21
4 Replies

2. UNIX for Dummies Questions & Answers

Where is Mozilla IRC Client on SuSE?

I have grown to love the IRC client built into the windows version of the Mozilla web browser. I bring up the browser and put irc:// into the URL drop down box and the IRC client pops up in a seperate window. However, when I use the Mozilla browser in SuSE 10, it just says "illegal protocol" or... (1 Reply)
Discussion started by: siegfried
1 Replies

3. Shell Programming and Scripting

How to setup a shell to use IRC behind firewall help

So, I have a free shell from an online provider which offer IRC access, I am behind a firewall blocking all IRC ports @ work, how can I use the Shell to get on IRC from work? What do I need to setup on the shell to be able to connect to the shell on the ssh port which allows connections from work,... (10 Replies)
Discussion started by: KromiX
10 Replies

4. UNIX for Dummies Questions & Answers

My domain name as my IRC hostname?

When I connect to any IRC server, it's usually my ISP IP address/hostname. I own a domain, but I'm not using it for anything (no web hosting service or server). Is it possible for me to use my domain as my IRC hostname instead of my regular ISP hostname? (0 Replies)
Discussion started by: guitarscn
0 Replies

5. Shell Programming and Scripting

Using ii for irc chat - scripting assistance?

I am using ii for irc on my pogoplug... hxxp://hg.suckless.org/ii/file/d163c8917af7/FAQ If you look at the bottom of there, it states 31 What other fancy stuff can I do with ii? 32 ---------------------------------------- 33 It is very easy to write irc bots in ii: 34... (3 Replies)
Discussion started by: spartan2006
3 Replies

6. Solaris

Migration of system having UFS root FS with zones root to ZFS root FS

Hi All After downloading ZFS documentation from oracle site, I am able to successfully migrate UFS root FS without zones to ZFS root FS. But in case of UFS root file system with zones , I am successfully able to migrate global zone to zfs root file system but zone are still in UFS root file... (2 Replies)
Discussion started by: sb200
2 Replies

7. SCO

Irc port

does anyone know of a port of irc like irssi for unixware? thanks (3 Replies)
Discussion started by: deus-programmer
3 Replies
SAFE_FINGER(8)						     Linux Programmer's Manual						    SAFE_FINGER(8)

NAME
safe_finger - finger client wrapper that protects against nasty stuff from finger servers SYNOPSIS
safe_finger [finger_options] DESCRIPTION
The safe_finger command protects against nasty stuff from finger servers. Use this program for automatic reverse finger probes from the tcp_wrapper (tcpd) , not the raw finger command. The safe_finger command makes sure that the finger client is not run with root privileges. It also runs the finger client with a defined PATH environment. safe_finger will also protect you from problems caused by the output of some finger servers. The problem: some programs may react to stuff in the first column. Other programs may get upset by thrash anywhere on a line. File systems may fill up as the finger server keeps sending data. Text editors may bomb out on extremely long lines. The finger server may take forever because it is somehow wedged. safe_finger takes care of all this badness. SEE ALSO
hosts_access(5), hosts_options(5), tcpd(8) AUTHOR
Wietse Venema, Eindhoven University of Technology, The Netherlands. Linux 21th June 1997 SAFE_FINGER(8)
All times are GMT -4. The time now is 06:35 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy