Date: Wed, 09 May 2001 23:39:58 -0700 From: Doug Barton <DougB@DougBarton.net> To: Sue Blake <sue@welearn.com.au> Cc: Laurence Berland <stuyman@confusion.net>, Jonathan Fortin <jfortin@akalink.com>, "Jonathan M. Slivko" <jslivko@jeah.net>, freebsd-questions@FreeBSD.ORG Subject: Re: Disabling The Root Account Message-ID: <3AFA37BE.CA62A617@DougBarton.net> References: <20010502142336.I30799-100000@awww.jeah.net> <00ba01c0d340$6f1097e0$0200320a@node00> <20010503061301.B6584@welearn.com.au> <3AF48067.76ABD833@confusion.net> <20010506091423.N220@welearn.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
Sue Blake wrote: > For example, people whose job it is to add users or virtual domains all > day just have sudo access to a couple of commands. Assistant admins can > be given root access to almost everything EXCEPT a few commands like su > and the shells (defined then marked like !THIS). See the example > sudoers file and its man page for ideas. Actually, the sudo documentation fairly clearly describes why this strategy is ineffective. Any user who has access to mv can give themselves a shell, period. There are other vulnerabilities, but this one is the easiest to understand. Doug To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3AFA37BE.CA62A617>