From owner-freebsd-questions Sun May 6 18:27:25 2001 Delivered-To: freebsd-questions@freebsd.org Received: from hecky.it.northwestern.edu (hecky.acns.nwu.edu [129.105.16.51]) by hub.freebsd.org (Postfix) with ESMTP id 6686037B42C for ; Sun, 6 May 2001 18:27:21 -0700 (PDT) (envelope-from stuyman@confusion.net) Received: (from mailnull@localhost) by hecky.it.northwestern.edu (8.8.7/8.8.7) id UAA21244; Sun, 6 May 2001 20:27:17 -0500 (CDT) Received: from confusion.net (dhcp089069.res-hall.nwu.edu [199.74.89.69]) by hecky.acns.nwu.edu via smap (V2.0) id xma021160; Sun, 6 May 01 20:26:57 -0500 Message-ID: <3AF5F998.445D4E05@confusion.net> Date: Sun, 06 May 2001 20:25:44 -0500 From: Laurence Berland X-Mailer: Mozilla 4.75 [en] (Win98; U) X-Accept-Language: en MIME-Version: 1.0 To: Sue Blake Cc: Jonathan Fortin , "Jonathan M. Slivko" , freebsd-questions@FreeBSD.ORG Subject: Re: Disabling The Root Account References: <20010502142336.I30799-100000@awww.jeah.net> <00ba01c0d340$6f1097e0$0200320a@node00> <20010503061301.B6584@welearn.com.au> <3AF48067.76ABD833@confusion.net> <20010506091423.N220@welearn.com.au> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I understand fully what you're saying, and mostly it makes sense. But, my point is just that, if you want to do away with root completely, and replace it with just sudo, then you're creating a user account that effectively has root priviledges, unless you require a single user console reboot to edit sudoers. That's all I'm saying... Have a good one, L: Sue Blake wrote: > > On Sat, May 05, 2001 at 05:36:23PM -0500, Laurence Berland wrote: > > Sue Blake wrote: > > > On Wed, May 02, 2001 at 03:45:25PM -0400, Jonathan Fortin wrote: > > > > No. > > > > What if someone gets a hold of your password, he wouldnt even need root > > > > password to have root access. he would just call /bin/sh via sudo and bam! > > > > sudo has it's pros and what you would be doing is a con. > > > > > > Well, you do have to understand what you're doing when you configure > > > sudo and when you dish out privileges, even to yourself. You also > > > have to change the way personal passwords are treated. Otherwise > > > don't use sudo, or root for that matter. > > > > But either a) you set your sudo policy once, and never again OR > > b) your user can edit the sudo policies. If so, they'll just add > > /bin/sh to the configuration. > > > > Or am I missing something? > > Yes, the catch is that it is futile to use sudo as a substitute for > the wheel group and just give blanket access to each of the good guys. > > Give them access to those specific commands that they need. In > particular, dissalow access to the visudo program and make sure they > can't edit the file directly, including as an argument to an allowed > command. You can even disallow visudo even for those who have access to > everything else, and they know circumvention attempts would be referred > to the hard copy rules of behaviour and the shot gun in the corner. > > For example, people whose job it is to add users or virtual domains all > day just have sudo access to a couple of commands. Assistant admins can > be given root access to almost everything EXCEPT a few commands like su > and the shells (defined then marked like !THIS). See the example > sudoers file and its man page for ideas. > > People who need broader access to administer and trouble-shoot in your > absence are a little trickier. But for starters you already trust them > somewhat, and also they know that the beginning of any agreed forbidden > practices will be logged (eg sudo /bin/sh if you forgot to disable that > one for them). > > You can even put the sudoers file under RCS and have a cron job to > periodically email an rcsdiff of the current file's contents to you, > then restore the approved sudoers from RCS. Put a commented warning at > the top of sudoers file to the effect that changes will NOT stick > unless they use RCS to register them and to add a change log. Anyone > who can't pick up RCS from the man pages probably can't pick up enough > to go on a rooting spree either, let alone untangle the sudoers file. > Those who you trust to run visudo in an emergency can do so in such > a way that their changes will survive or be temporary ad lib, and > you'll see what they've done. > > You're right, like most security tools, using sudo can be more > dangerous than not, if you don't use it the way it is intended with > some careful planning. > > -- > > Regards, > -*Sue*- > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message -- Laurence Berland Northwestern '04 stuyman@confusion.net http://www.isp.northwestern.edu/~laurence "The world has turned and left me here" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message