|
El mundo de la Informática está llena de casos curiosos: existe la definición de BOFH, iniciales del término en inglés de Bastard Operator From Hell, literalmente «Maldito Operador del Infierno», aunque podría traducirse como Infame Administrador del Demonio. Este es un personaje ficticio creado por Simon Travaglia, quien escribió varias historias por Internet acerca de un administrador de red de una universidad.
Un BOFH se caracteriza por llevar toda su ira sobre los lusers (él los considera una mezcla de user, usuario en inglés, con loser, perdedor) que le llaman en busca de ayuda, les hace la vida imposible y se divierte a costa de sus desgracias.
Pero la cosa no acaba aquí: resulta que hay un concurso anual de operador del año, al estilo de Miss Mundo, pues se llama www.sysadminoftheyear.com… El segundo de este año 2006 ha sido uno que se jugó el tipo para sacar las copias de seguridad en un incendio, y se tiró luego una semana durmiendo 3 horas para restaurar la información… Posíblemente su empresa se lo agradeciera dándole una palmadita en la espalda :-).
Y para rematar la faena, hay un test de 555 preguntas, en las que por cada respuesta afirmativa sumas un punto a tu definición de «virgin» SysAdmin Operator, y conseguir un cero es lo más cercano al operador «perfecto» (se llama SysAdmin Purity Test):
Accounts
- Have you ever created an account?
- A non-user account?
- Have you ever deleted an account?
- Restored a deleted account?
- Should you not have deleted it?
- Have you ever detected a security breach (breakin, root compromise, or some such)?
- Did you track down the jerk who did it?
- Did you identify him/her?
- Did you sick the FBI on him/her?
- Did you get a conviction?
- Did the perpetrator kill him/herself in jail out of remorse?
- Have you ever threatened to kill someone’s account if they ask another stupid question? Did you?
- Have you ever noticed that some ‘remove_user’ shell scripts clean up by removing the user’s home directory?
- Did you notice this before you removed a system account whose home directory is ‘/’?
- Do you keep more than one account for personal use?
- Do you have accounts on alien networks (not administered by you) for «debugging» purposes?
- Do you not allow them on your own system?
- Do you grant «guest» accounts to your friends?
- Does the number of guests ever exceed the number of legitimate users?
- Have you ever had an account on a machine on the ARPANET?
- BITNET?
- MILNET (only if you don’t work in the military)?
- Do they still work?
- Can you prove it?
- Do you have a user named «ingres»?
- Have you caught people logged in from remote sites into that account?
Passwords
- Do your accounts have passwords?
- Do you run Crack on passwords?
- Does it take longer than a week?
- Even though it checks only recently changed passwords?
- Have you ever used any of the following passwords (case insensitive):
- abcdef
- 123456
- qwerty
- xyzzy
- M1PQ
- password
- Were these used as root passwords?
- Do you have a different root pasword than your own password?
- Have you ever forgotten your root password?
- Do you have multiple uid-0 accounts on your system?
- Do any of them have no password?
- Do any of them have no password and a standard shell?
- Do you have equivalenced hosts (.rhosts, hosts.equiv)?
- Did you check user verifications?
- Do you use shadow passwords?
- Does your system officially support it?
- Do you have passworded groups?
- Do you have any padded-password systems installed?
- Do you silently change users’ passwords?
- Do you trust someone else with the root password while you’re on vacation?
- Do all dial-up IP users use the same dial-up IP account?
- Without security handshaking?
Security
- Have you ever accepted a UUCP file?
- Without password protection?
- Do you use maximum auditing?
- Do you audit each user?
- Do you subscribe to all of the following mailing lists :
- 8lgm
- bugtraq
- cert advisories
- ciac
- Do you read all the posts?
- Have you ever posted to one of them?
- Did you get flamed?
- you don’t subscribe to these lists, because Dan Farmer and Gene Spafford tell you personally when they discover a new security hole.
- Do you use rdist?
- Is the security bug active?
- Have you ever been trying to fix the system clock and expired root’s password?
- Has your site ever been broken into?
- By a KGB agent?
- Did you care?
- Have you ever broken into someone else’s site?
- Is that how you got your job?
Networks
- Have you ever configured a network interface?
- Have you ever connect a machine to the Net?
- Have you ever ifconfig’ed down the network interface through which you were communicating to the machine?
- Have you ever logged some traffic to/from the Internet?
- Have you ever logged all traffic to/from the Internet?
- Did you read the logs?
- More than 3 times a month?
- Daily?
- Have you ever filtered IP traffic?
- Have you ever built a proxy service firewall?
- Have you ever concealed portions of your network?
- Have you ever concealed your entire network except for a proxy firewall?
- Have you ever wormhole-tunneled traffic to conceal portions of your network?
- Have you ever floodpinged your supervisor’s workstation?
- Can you program routing?
- gated?
- A Cisco/Wellfleet/Annex/whatever brand dedicated router?
- KA9Q?
- Have you ever used an IP address different than the one assigned to you?
- On purpose?
- To get around a network problem?
- To increase your access privileges?
- To hide your acts?
- Have you ever brought up a PPP link?
- Between two Cisco routers?
- On the AUX port?
- Did you run IP over it?
- Did you run IPX over it?
- Did you run transparent bridging over it?
- Did it stay up for more than 10 minutes?
- Did you use the undocumented ppp commands?
- Have you ever plugged both Token Ring & Ethernet modules into the same backplane & segment on a Synoptics 3800?
- Did they work?
- Did you have connectivity?
- Have you ever tried to configure EIGRP and IGRP at the same time?
|