Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 May 2001 13:52:13 -0500
From:      Eric Anderson <anderson@centtech.com>
To:        Erik Trulsson <ertr1013@student.uu.se>
Cc:        Forrest Houston <fhouston@east.isi.edu>, "Oulman, Jamie" <JOulman@iphrase.com>, "'freebsd-security@freebsd.org'" <freebsd-security@freebsd.org>
Subject:   Re: nfs mounts / su / yp
Message-ID:  <3B00295D.24643CD7@centtech.com>
References:  <20010514200927.A32697@student.uu.se> <Pine.WNT.4.10.10105141416260.-559341@rosencrantz.east.isi.edu> <20010514204259.A33451@student.uu.se>

next in thread | previous in thread | raw e-mail | index | archive | help
Well, I think the problem is  that a local root should mean only local
root access, and su should not allow you to su to non-local users (ie,
NIS users).  Forrest, you have it close to what I am troubling with.  I
have users that WILL get root on their desktop machines, one way or the
other.  These users log into others machines (which is needed, and
acceptable).. The problem is simply how do you stop root from su'ing to
another user? (and deleting the binary is not an answer, since
downloading and/or compiling your own is simple enough)..

Eric



Erik Trulsson wrote:
> 
> On Mon, May 14, 2001 at 02:18:16PM -0400, Forrest Houston wrote:
> > The problem is further complicated though when you want the user to have
> > root access.  We have some people around here who need/want total access
> > to their machine.  However there is still the concern of the NFS
> > mounts.  What do you do in these circumstances?
> >
> 
> If those people have their own, personal, machines then you solve it by not
> letting any other machines trust the 'compromised' machines.
> Only export that persons homedirectory via NFS to that machine. Do not allow
> any other directories to be mounted. Be careful with accepting
> logins/connections from it. Basically treat it as if it was some unknown
> machine out on the Big Bad Internet.
> 
> And make sure that the root password for those machines is different from
> that on other machines.
> 
> It is usually a bad idea to give users root access if you don't trust them.
> If you still have to give them root access then isolate their machines so
> that they cannot access other machines.
> 
> > Thanks
> > Forrest
> >
> > On Mon, 14 May 2001, Erik Trulsson wrote:
> >
> > >
> > > If a user can login as root or su to root then they can (almost by
> > > definition) do whatever they want. The solution is therefore to prevent
> > > users getting root access in the first place since once they get it it is
> > > too late to do anything about it.
> > > First of, all make sure that only people you trust are in the wheel group and
> > > know the root password. This will prevent other people from doing an su to root.
> > >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> 
> --
> <Insert your favourite quote here.>
> Erik Trulsson
> ertr1013@student.uu.se

-- 
-------------------------------------------------------------------------------
Eric Anderson	 anderson@centtech.com    Centaur Technology    (512)
418-5792
The idea is to die young as late as possible.
-------------------------------------------------------------------------------

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3B00295D.24643CD7>