←back to thread

163 points rbanffy | 6 comments | | HN request time: 0.418s | source | bottom
1. jerf ◴[] No.42147397[source]
> Never put a console running DC Linux outside of a firewall: it is an intentionally insecure system. Any bot scanning your network will get root immediately.

Yeah, that's really important advice. They'll get root, and then they'll... ummm... they'll... hmmmmm.... ahhh.... Be really confused? Start mining monero? Sideload Crazy Taxi and start playing it on your Dreamcast?

replies(3): >>42148180 #>>42150538 #>>42156227 #
2. freeone3000 ◴[] No.42148180[source]
start mining monero is the most likely outcome. I had a server get hit with this recently through a vulnerability I was never able to track down
replies(1): >>42149775 #
3. duskwuff ◴[] No.42149775[source]
> start mining monero

Good luck with that! Even Monero's "light mode" requires 16 times more memory than is available on the system.

4. sangnoir ◴[] No.42150538[source]
Join a botnet, and use your node to log into other devices and/or deliver attack payloads.
replies(1): >>42156917 #
5. SuperNinKenDo ◴[] No.42156227[source]
Well, a known problem with pre v4 NFS is that it uses and trusts client side UIDs I believe, In fact I believe even v4 does this by default. So if I understand correctly, it treats root on the client like root on the server, and since NFS gives direct access to the block device this is even worse than it initially sounds.
6. jerf ◴[] No.42156917[source]
Yeah, with all those Hitachi SH-4 32-bit RISC payloads running around in malware you can't be too protective. With the mighty power of 200MHz just imagine all the RISC malware it could run.