It’s A Trap!

Some time ago, we had to coordinate with a security firm for a scan of our environments: infrastructure, servers, applications, services, accounts, physical access – the lot. The conversation went a bit like this:

Security: “Could you get us your root password so we can test your systems for vulnerabilities?”

Me: “No.”

Security: “We need it to check for specific kernel-level threats.”

Me: “No.”

Security: “We were told we’d have your complete cooperation.”

Me: “Yep.”

Security: “But you aren’t cooperating. Are you now saying you aren’t going to help us?”

Me: “I don’t think we’re all on the same page here.”

Security: “What do you mean?”

Me: “You’re the security consultant. You’re experts. The premise is that you’re testing our systems to identify actual threats. By all means, do so. But you’ll not be getting a leg up from us by giving you instant access to anything. Additionally, while management has asked that we provide full cooperation, it’s actually a violation of company policy to give anyone any passwords to any systems – even for actual security tests. Further, even if it weren’t a violation of company policy and general good administrative practice, there simply aren’t any root passwords to give you.”

Panic in the eyes of management and a smug look on the security consultant’s face when they think that no password means anyone can log in.

Me: “I know what you’re thinking – but we use operating systems that, by default, don’t have root passwords because root accounts are gaping security threats. We can’t give you a root password because nobody can log in to the root account. We actually require each person to have their own credentials and approppriate levels of access so we can manage and audit. Nobody can log in to root. Ever.”

Security: “But if you could just go ahead and enable the root account for us so we can scan these systems for vulnerabilities…”

Me: “Sorry, but no. What you’re saying is that you want us to violate company policy by divulging passwords that don’t exist and to create a security hole so you can tell us that our systems now have a security hole that wasn’t there until you insisted that we create it. And so you can test what it is that root can do on a system? It’s root – it can do anything it wants, which is precisely why we have it disabled. I’m not going to make things less secure so we can make them more secure.”

Fast forward a few months and see a security report from another agency testing another company and find that they remarked that the primary security threat consisted of easily obtaining the root passwords to key systems by simply making a few phone calls, asking around, then using some good, old-fashioned social engineering to trick people into divulging them.

So, can you have our root passwords for your company-sanctioned security test?

Not a chance.

Ponder This

I don’t know what’s more disturbing:

– That we find ourselves pondering buying a house–only nine months after we sold the last one.

– That because I’m so unfamiliar with the current process, I actually googled “how to buy a house”

– Or that there are 654,000,000 pages out there actually describing how to do so.