[ale] Sunday 05-22-05 6PM RUN-AS-ROOT CHALLENGE
ChangingLINKS.com
groups at ChangingLINKS.com
Wed May 18 14:55:52 EDT 2005
> On Wed, May 18, 2005 at 12:58:37PM -0400, Jim Popovitch wrote:
> > If that is true, than you (and everyone else involved in this thread) is
> > a troll for not assuming he was talking (if he even is) about a cdrom
> > based distro. Clearly the onus is on you to ask questions if you don't
> > know the answer. You can't go around all the time assuming you know
> > everything about everyone else. Basic assumtions, yes. Gross oversight
> > and/or wanton ignorance of what is being discussed is no excuse.
On Wednesday May 18 2005 12:14, George Carless wrote:
> Ah, what a crock. When people make extraordinary claims, the onus is upon
> them to support those claims.
THAT is why I set up the challenge.
I like contests rather than to bicker back and forth. No matter what I say,
you will discredit it and call me a troll. But, with a contest - whereby you
prove your point for FAIL - it is much more black and white. Actions.
> Or shall I claim that I can walk on water, and when you complain neglect to
> tell you that I am referring to ice? You may find this kind of thing
> humourous; I consider it trolling.
> --George
You are backpeddling already. You are now assuming I am running a liveCD.
That is what Jim P. IS pointing out and you refuse to acknowledge.
I SHOULD NOT HAVE TO TELL YOU WHAT I AM RUNNING.
I SHOULD NOT HAVE TO GIVE YOU ROOT PASSWORD.
I SHOULD NOT HAVE TO TELL YOU MY IP.
Even given the fact that I am WILLING to give you that information, you are
still saying that is not enough! I have redundant security features (one
trick I even came up with myself - it's a neat idea really). I should NOT
have to outline them all.
In the REAL WORLD (outside of this challenge) a hacker must crack into the
system somehow, analyze it, and THEN do some type of "damage." In the real
world I don't have to do any hand holding. In the real world, I don't post
every security feature that I employ online. Again, I bring up the fact that
your camp would start asking me to do things that YOU don't do with YOUR
systems.
Want to know what I have installed?
Want to know how my system is designed?
Want to know how I can restore my system so quickly?
Want to know what the version of each piece of software is?
Want to know what method I use to restore, and protect data?
Want to know how I audit the software that I install in my system?
Want to know how I verify whether or not viruses are on my system?
Want to know . . . geez, what more do you NEED?
You all didn't need any of that information before assuming that my system was
designed like yours. You didn't need that information before trolling the
run-as-root argument and then complaining when I said I didn't want to
participate). You didn't need that information before my challenge was
accepted. You didn't need all of that information before making YOUR claims.
My goal is to pit claim against claim - and hand you your ass. My ultimate
goal is to design and operate a system that is easy to use and secure.
Now you will backpeddle, call it a waste of time, and make other excuses.
There is NO excuse.
Moreover, I set up this challenge, to win a fixed computer (my original intent
and focus) as well as share the information as to how I run my system (in
general). You want more information BEFORE the challenge so that you can use
it DURING the challenge. I set up the challenge with the sincere belief that
I would win - the challenge was accepted on the belief that I could not win.
I was safe in assuming that someone like Jerry Yu would connect, type rm -rf /
and giggle. He even posted it. Of course, that will interfere with what the
next guy is trying to do - like corrupting the BIOS or installing a stealthy
virus. I was safe to assume that 30 minutes is not really a whole bunch of
time to fully analyze the system and decide what would be the best tactic to
down it. 30 minutes goes by fast (especially in light of the fact that some
of that time would be spent on connection verification).
There are security features that I NORMALLY run that would not allow control
of the box to be handed over so easily:
The way I designed my ENTIRE LAN was so that someone could STEAL THE ENTIRE
LAN - and I could replace the hardware and be back up and running on a Sunday
afternoon. That goes beyond running as root, picking a distro, hardware
compatibility, virus protection, data security, backup methodology,
installation and configuration, and software auditing.
However, it does not go beyond your camp's ability to assume.
You assumed that I did not have such a design. Don't backpeddle. Live with it.
--
Wishing you Happiness, Joy, and Laughter,
Drew Brown
http://www.ChangingLINKS.com
More information about the Ale
mailing list