Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 09 May 2001 23:39:58 -0700
From:      Doug Barton <DougB@DougBarton.net>
To:        Sue Blake <sue@welearn.com.au>
Cc:        Laurence Berland <stuyman@confusion.net>, Jonathan Fortin <jfortin@akalink.com>, "Jonathan M. Slivko" <jslivko@jeah.net>, freebsd-questions@FreeBSD.ORG
Subject:   Re: Disabling The Root Account
Message-ID:  <3AFA37BE.CA62A617@DougBarton.net>
References:  <20010502142336.I30799-100000@awww.jeah.net> <00ba01c0d340$6f1097e0$0200320a@node00> <20010503061301.B6584@welearn.com.au> <3AF48067.76ABD833@confusion.net> <20010506091423.N220@welearn.com.au>

next in thread | previous in thread | raw e-mail | index | archive | help
Sue Blake wrote:

> For example, people whose job it is to add users or virtual domains all
> day just have sudo access to a couple of commands. Assistant admins can
> be given root access to almost everything EXCEPT a few commands like su
> and the shells (defined then marked like !THIS). See the example
> sudoers file and its man page for ideas.

	Actually, the sudo documentation fairly clearly describes why this
strategy is ineffective. Any user who has access to mv can give themselves
a shell, period. There are other vulnerabilities, but this one is the
easiest to understand.

Doug

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3AFA37BE.CA62A617>