Date: Fri, 11 Aug 2000 16:14:27 -0400 From: Branson Matheson <Branson.Matheson@FergInc.com> To: freebsd-isp@FreeBSD.ORG Subject: Re: root password in NIS maps Message-ID: <20000811161426.K2314@toth.ferginc.com> In-Reply-To: <Pine.BSF.4.21.0008111158230.29027-100000@shell01.pns.net>; from freebsd@jnternet.net on Fri, Aug 11, 2000 at 12:03:52PM -0500 References: <Pine.BSF.4.21.0008111943090.10597-100000@finland.ispro.net.tr> <Pine.BSF.4.21.0008111158230.29027-100000@shell01.pns.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Ugh.. a better solution is to use a program like sudo and runas..
using root routinely for anything is a bad idea
- there is little to no tracking on what was done
- the only log you have is that it was logged into
- the more people that know the password the more people that can be
held liable if there is a breach of security
Having under NIS is bad for the below reasons .. but also because NIS
is inherently insecure!!! it is not that hard to spoof an NIS
client. So anyone could get root. And... Unless you have been really
careful.. it would be fairly easy to bind to your server and pull
your password file ( including root ) and given the speed of
computers these days.. and a good dictionary and rules file .. your
root password could be brute forced at some point. Better to not make
it available at all.. use runas/sudo to allocate specific commands to
those that need them.. impliment central syslogging so that you have
a record, and go from there.
As a rule .. you never want priviledged logins under a distributed
login system. *possibly* LDAP .. if you have been anal retentive in
setting it up. But definately not NIS.
As much as a PITA as it is to maintain the apache account seperately
on all hosts .. it is a better solution. ssh can be your friend for
this. rdist as well.. there are any number of fairly well
documented push and pull schemes out on the net using those two
softwares to mass update accounts in a secure manner.
- branson
On Fri, Aug 11, 2000 at 12:03:52PM -0500,Nate Johnston did mutter:
> On Fri, 11 Aug 2000, Evren Yurtesen wrote:
>
> > I would like to have root password in NIS maps but there is only one
> > problem. When I login to a client machine everything works fine. I can
> > even use 'su' but when I use a command like 'ls -la' I see 0 for the UID
> > field of the output.
> >
> > Does anybody have root password in their NIS maps and it works fine? if
> > yes then how???
>
> Having the password for user 'root' in your NIS maps is really a bad
> idea. What happens if the machine fails, and for some reason it can't
> connect to the NIS server? What happens when you want to use the server
> in single-user mode?
>
> probably the best thing to do is this: leave 'root' as a local UID 0 user
> as usual. On your NIS server, create a new user that also has UID 0, but
> with a centrally controlled password. Then, the local root will assert
> itself in all the usual ways (UID mapping, single-user-mode passwords),
> but you will be able to control root logins.
>
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-isp" in the body of the message
- branson
-------------------------------------------------------------------------------
Branson Matheson " If you are falling off of a mountain,
Unix Systems Manager You may as well try to fly."
Ferguson Enterprises, Inc. - Delenn, Minbari Ambassador
( $statements = <BRANSON> ) !~ /Corporate Opinion/;
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-isp" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000811161426.K2314>
