Topic: Are the prconfigured logins a security risk?
While looking up how to add a new user (search adduser), I happened to look in my /etc/passwd (below) and found several preconfigured accounts. I had already passworded root, I also created a password for default.
There seem to be several accounts (already passworded) that allow remote access, including news sshd and chumby. Some are for processes, I assume news and chumby allow remote access for the manufacturer (i.e., when you add an app from a Chumby.com account, the server needs a way to remote into the device and add the app).
My question is, are these passwords generally know to the community (with physical access to the device I would think they would be hard to protect)? Is it a security hole we have to accept for the proper functioning of the device?
root::0:0:root:/root:/bin/ash
bin:*:1:1:bin:/bin:/sbin/nologin
daemon:*:2:2:daemon:/sbin:/sbin/nologin
adm:*:3:4:adm:/var/adm:/sbin/nologin
lp:*:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:*:5:0:sync:/sbin:/bin/sync
shutdown:*:6:0:shutdown:/sbin:/sbin/shutdown
halt:*:7:0:halt:/sbin:/sbin/halt
mail:*:8:12:mail:/var/spool/mail:/sbin/nologin
news:*:9:13:news:/etc/news:
uucp:*:10:14:uucp:/var/spool/uucp:/sbin/nologin
operator:*:11:0:operator:/root:/sbin/nologin
sshd:x:103:99:Operator:/var:/bin/sh
games:*:12:100:games:/usr/games:/sbin/nologin
gopher:*:13:30:gopher:/var/gopher:/sbin/nologin
ftp:*:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:*:99:99:Nobody:/:/sbin/nologin
apache:x:48:48:Apache:/var/www:/bin/false
httpd:x:49:49:HTTP Daemon:/home/httpd:/bin/false
ntp:x:38:38::/etc/ntp:/sbin/nologin
default:x:1000:1000:Default non-root user:/home/default:/bin/sh
chumby:x:1001:1001:Chumby Industries,,,:/root:/bin/ash