From owner-freebsd-security@FreeBSD.ORG Tue Jun 10 14:32:14 2003 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id ECBF937B401; Tue, 10 Jun 2003 14:32:14 -0700 (PDT) Received: from mta1.adelphia.net (mta1.adelphia.net [64.8.50.175]) by mx1.FreeBSD.org (Postfix) with ESMTP id DCD1B43FAF; Tue, 10 Jun 2003 14:32:13 -0700 (PDT) (envelope-from jond@uidaho.edu) Received: from uidaho.edu ([68.66.181.7]) by mta5.adelphia.net (InterMail vM.5.01.05.32 201-253-122-126-132-20030307) with ESMTP id <20030610071448.ZNOO1551.mta5.adelphia.net@uidaho.edu>; Tue, 10 Jun 2003 03:14:48 -0400 Message-ID: <3EE58562.1070601@uidaho.edu> Date: Tue, 10 Jun 2003 00:14:42 -0700 From: Jon DeShirley User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3) Gecko/20030312 X-Accept-Language: en-us, en MIME-Version: 1.0 To: Brett Glass References: <200306092254.QAA10240@lariat.org> <200306092254.QAA10240@lariat.org> <4.3.2.7.2.20030610010227.02a68ed0@localhost> In-Reply-To: <4.3.2.7.2.20030610010227.02a68ed0@localhost> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit cc: Doug Barton cc: security@freebsd.org Subject: Re: Removable media security in FreeBSD X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 10 Jun 2003 21:32:15 -0000 On Tue, 9 Jun 2003 Brett Glass wrote: > At 05:21 PM 6/9/2003, Doug Barton wrote: > >>On Mon, 9 Jun 2003, Brett Glass wrote: >> >>>Allowing the user to use sudo would effectively be giving him/her root >>>privileges, which we explicitly don't want to do. >> >>No it wouldn't. You can specify the commands that you allow each user to >>run. > > Ah, but letting the user mount and unmount things effectively lets that > person do anything he or she wants, by switching around what's mounted > at key mountpoints. Example: %users NOPASSWD:ALL=/sbin/mount /cdrom,/sbin/umount /cdrom What does this do? It allows users in the group 'users' to run the explicit commands ONLY. Now, unless you give them sudo access to vi /etc/fstab or something, there's no way '/sbin/mount /cdrom' is going to change behavior. btw, I would suggest reading the sudoers manual: http://www.courtesan.com/sudo/man/sudoers.html Cheers, --jon