Date: Sat, 11 Jul 1998 19:35:38 -0500 (CDT) From: "Kent S. Gordon" <kgor@ksg.com> To: jehamby@manta.jpl.nasa.gov Cc: 026809r@dragon.acadiau.ca, security@FreeBSD.ORG Subject: Re: RootRunner (admin GUI w/o security holes?) Message-ID: <199807120035.TAA10008@soccer.ksg.com> In-Reply-To: <Pine.GSO.3.96.980710164953.3860H-100000@manta> (message from Jake Hamby on Fri, 10 Jul 1998 16:53:44 -0700 (PDT))
next in thread | previous in thread | raw e-mail | index | archive | help
>>>>> "jehamby" == Jake Hamby <jehamby@manta.jpl.nasa.gov> writes:
> On Fri, 10 Jul 1998, Michael Richards wrote:
>> Why not just use ssh to forward your root x connections via an
>> encrypted connection. All of your problems go away. You are
>> even secure from network sniffers because the entire data
>> stream is encrypted.
> Well, I definitely want to support ssh to allow secure remote
> administration (where it would replace su or sudo in the scheme
> I described), but I'm really loath to run any part of the GUI as
> uid 0, if it's at all possible to avoid. While it's probably
> not a security hole, per se, my biggest problem is the one I
> already mentioned of how to start the program from the "start
> menu" of your favorite windowmanager, without having to pop up
> an ugly xterm window to ask for the root password.
You could always create an no password entry in sudo for these cases
or a special suid binary that invokes the program. I have used no
password entry in sudo for this in the past.
> -Jake
> To Unsubscribe: send mail to majordomo@FreeBSD.org with
> "unsubscribe security" in the body of the message
--
Kent S. Gordon
KSG -- Unix, Network, Database Consulting
Postal: 76 Corral Drive North, Keller, Texas 76248
e-mail: kgor@ksg.com Phone:(817)431-8775 Resume: http://www.ksg.com/resume.html
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199807120035.TAA10008>
