Date: Wed, 10 Jul 96 07:33:22 -0700 From: Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca> To: Brian Tao <taob@io.org> Cc: FREEBSD-SECURITY-L <freebsd-security@freebsd.org> Subject: Re: sudo Message-ID: <199607101433.HAA18963@passer.osg.gov.bc.ca> In-Reply-To: Your message of "Tue, 09 Jul 96 20:08:28 EDT." <Pine.NEB.3.92.960709200721.18177A-100000@zap.io.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> What are people's feelings towards the "sudo" utility? Is it
> really all that usefull, or does it just open up a lot of potential
> avenues of attack and abuse? Some of our co-located customers want to
> have it installed so they can do some root-privileged stuff, instead
> of getting us to do it all the time (even though that's what they pay
> us to do).
Where I work we use it all the time. We use it mainly internally within the
Open Systems Group (people who would normally have the root password anyway).
The root passwords are normally not used and are stored in an envelope in the
security services office. We currently have only one client who requires sudo
to mount a number of VM/ESA minidisks on a Sun box to load a DB2 database. In
this case a we have built some code to prompt the user for various VM specific
mount options. The code only allows them to mount VM minidisks from two VM
machines on our raised floor.
I have seen indiscriminate use of sudo which will compromise a system. For
example, vi and more. Granting sudo access to vi is an obvious hole but more is
a little subtle. Since you can shell escape in more, granting access to more
would grant the user a root shell.
To make effective use of sudo with a help desk, for example, you would need to
build code to perform the required function while restricting the user's access
to other functions. For example, if you wish to have your helpdesk alter
end-user's dot files when when your users call in for help, you could create
some code to copy the user's dot file to a work area, via sudo, then edit the
dot file in the work area, under the help desk person's own id, and finally copy
the working copy of the dot file from the work area to the user's home
directory. Your code would contain checks to ensure that only end-user's dot
files can be updated, not the files of system administration staff.
In short, granting root privilege via sudo takes a lot of planning to ensure
that all potential security holes are plugged.
> --
> Brian Tao (BT300, taob@io.org, taob@ican.net)
> Systems and Network Administrator, Internet Canada Corp.
> "Though this be madness, yet there is method in't"
>
Regards, Phone: (604)389-3827
Cy Schubert OV/VM: BCSC02(CSCHUBER)
Open Systems Support BITNET: CSCHUBER@BCSC02.BITNET
ITSD Internet: cschuber@uumail.gov.bc.ca
cschuber@bcsc02.gov.bc.ca
"Quit spooling around, JES do it."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199607101433.HAA18963>
