<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: who should have root access in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662201#M797136</link>
    <description>Only admin's should have root password.&lt;BR /&gt;&lt;BR /&gt;Operations doesn't need it, you can use sudo to give them any functionality they need.&lt;BR /&gt;&lt;BR /&gt;Good plan.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Tue, 01 Nov 2005 14:53:35 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2005-11-01T14:53:35Z</dc:date>
    <item>
      <title>who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662200#M797135</link>
      <description>i have a user that wants to be root. its to the point where we are having a meeting as a group to review our root access procedure. below is what we do for root access ...does it make sense?&lt;BR /&gt;&lt;BR /&gt;1) only two people know the password ...myself and a guy i have trained at night (this is a 24x7 fab)&lt;BR /&gt;&lt;BR /&gt;2) if we are not physically present then call us to do the work seemingly needed if urgent else send us an email/voice-mail&lt;BR /&gt;&lt;BR /&gt;3) if we are not responding to an urgent need then a list of 10 people or so can have access to all the root passwords stored in envelopes with our security group by following a simple procedure to get the envelope/s (i update the envelopes/passwords later due to them being accessed)&lt;BR /&gt;&lt;BR /&gt;is this a OK? my concern is that people want root access to satisfy their convenience at the expense of mine. i feel that problems are reduced when less people have access to root ...regardless of their skills/needs&lt;BR /&gt;&lt;BR /&gt;keep in mind that my systems are very stable and more often then not when people have asked to have root access it was for tasks that did not need to be done as root&lt;BR /&gt;&lt;BR /&gt;i have a meeting tomorrow and would absolutely appreciate any guidelines/support/criticism/etc...&lt;BR /&gt;&lt;BR /&gt;FYI: i do have sudo setup and tweaked as needed for some users/commands but i actually do not like this, nor do i like setuid scripts which i am also using to satisfy some users ...in the end i am trying my best to find a balance between users and me since the servers are not for me or for the users as much as they are for some task/application/job...</description>
      <pubDate>Tue, 01 Nov 2005 14:44:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662200#M797135</guid>
      <dc:creator>Marc Ahrendt</dc:creator>
      <dc:date>2005-11-01T14:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662201#M797136</link>
      <description>Only admin's should have root password.&lt;BR /&gt;&lt;BR /&gt;Operations doesn't need it, you can use sudo to give them any functionality they need.&lt;BR /&gt;&lt;BR /&gt;Good plan.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 01 Nov 2005 14:53:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662201#M797136</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-11-01T14:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662202#M797137</link>
      <description>Marc --&lt;BR /&gt;&lt;BR /&gt;It sounds like a reasonable plan to me.  We do something similar -- four people have root and we are suppossed to log into our own root account and "su -" to root so that there is at least some trail to what is going on.&lt;BR /&gt;&lt;BR /&gt;What are the specific reasons that he wants root?  Are they things you could accomplish with "sudo" (despite your not liking it)?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Nov 2005 14:54:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662202#M797137</guid>
      <dc:creator>Kent Ostby</dc:creator>
      <dc:date>2005-11-01T14:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662203#M797138</link>
      <description>Marc:&lt;BR /&gt;&lt;BR /&gt;You have summarized the usual request well: "...people want root access to satisfy their convenience [your] expense".&lt;BR /&gt;&lt;BR /&gt;I think you have provided very adequate access given that you respond to requests; have a backup support person; and in an emergency have provided a route to access.&lt;BR /&gt;&lt;BR /&gt;In my opinion, those who would have to clean up a mess tend to take better care not to make a mess in the first place.  Stand firm.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;..JRF... &lt;BR /&gt;</description>
      <pubDate>Tue, 01 Nov 2005 14:55:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662203#M797138</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2005-11-01T14:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662204#M797139</link>
      <description>Well IMO only the admins should have root. &lt;BR /&gt;&lt;BR /&gt;There are rare occasions when someone other than an admin needs root for certain commands. &lt;BR /&gt;And sudo could be setup for those commands. However be careful because there are some commands that can be exploited. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Nov 2005 15:04:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662204#M797139</guid>
      <dc:creator>Marvin Strong</dc:creator>
      <dc:date>2005-11-01T15:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662205#M797140</link>
      <description>Your approach is reasonable although there does need to be some time limits in your standards (such as if no response within 30 minutes then ...). Also, 10 or so people when two are able to handle the normal load seems very excessive. You are really setting yourself up for the scenario where an "unused" disk (LUN, LVOL, ...) get used disastrously --- and, of course, the answer is "I didn't do it."  &lt;BR /&gt;&lt;BR /&gt;Ultimately, you are responsible for whatever happens so you should be in control. If this were me rather than your "10 or so" approach, I would prefer to add another trusted admin to your present group of two and make sure that at least one of you is available (or on call) at all times. &lt;BR /&gt;&lt;BR /&gt;The thought of setuid scripts scares me to death; those are security bombs waiting to explode. Sudo is the far better approach but sudo'ed tasks should be tightly controlled and extremely limited in scope.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Nov 2005 15:12:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662205#M797140</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2005-11-01T15:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662206#M797141</link>
      <description>IMHO, if you give the passwords away, where is the reason to have passwords? Why you have secured doors to your computer rooms?&lt;BR /&gt;&lt;BR /&gt;If you give the password to users, do you know if other users get it too?&lt;BR /&gt;&lt;BR /&gt;You are loosing control! Remember, root can do everything and all you know is, this was root. I would stay with the current procedure.</description>
      <pubDate>Tue, 01 Nov 2005 15:18:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662206#M797141</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2005-11-01T15:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662207#M797142</link>
      <description>Only admins should have root. Managers may want to have access to the root passwd in case of disaster.&lt;BR /&gt;&lt;BR /&gt;Setup the admins in the wheel group. Only members of the wheel group have access to the root account. Even if the passwd is known throughout only wheel group members can become root. (Do a 'man security' to see this option and others)&lt;BR /&gt;&lt;BR /&gt;Configure the /etc/securetty to allow root login only on console.&lt;BR /&gt;&lt;BR /&gt;Lots of access policies to review</description>
      <pubDate>Tue, 01 Nov 2005 15:18:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662207#M797142</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-11-01T15:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662208#M797143</link>
      <description>It appears like our systems are designed quite well.  Root password should be restricted, and you seem to have a very good process in place.&lt;BR /&gt;&lt;BR /&gt;If the systems are stable, there should be no need for users to access the system as root.  I have managed some systems for years with out this type of request.  On the other hand I had a couple of systems where the users went up the ladder far enough to get the authorization - until one of them inadvertently wiped out an oracle database.........&lt;BR /&gt;&lt;BR /&gt;When a user logs in as root, you  have no audit trail, and no way to show what he did - not a good idea.</description>
      <pubDate>Tue, 01 Nov 2005 15:56:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662208#M797143</guid>
      <dc:creator>DCE</dc:creator>
      <dc:date>2005-11-01T15:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662209#M797144</link>
      <description>A point to be made - are your systems ever audited? Do you have outside auditors come in and try to tell you what is wrong?&lt;BR /&gt;&lt;BR /&gt;Of all things the auditors may try to tell you that is wrong with your systems, the one item that they are correct in is the access to the root account.&lt;BR /&gt;&lt;BR /&gt;If you have users that need to run/access their stuff, check the permissions and ownerships. This can be (and is) the 1st line of defense for securing your systems. Access to root is not required to view a user's files if the perms are set correctly.</description>
      <pubDate>Tue, 01 Nov 2005 16:04:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662209#M797144</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-11-01T16:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662210#M797145</link>
      <description>wow ...too many responses to give individual feedback!&lt;BR /&gt;&lt;BR /&gt;thx for all your comments (more are welcome)! they are very helpful and it seems that what i am doing overall is not uncommon and very good practice.&lt;BR /&gt;&lt;BR /&gt;below is what i plan to modify, if my manager allows me to keep the control to continue what i have setup for the past ~5 years&lt;BR /&gt;    1) as clay stated, define better time limits ...how long to wait on me responding to a call/page/email&lt;BR /&gt;    2) as kent &amp;amp; rick stated, possibly make people access root from other accounts to help track future use&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Nov 2005 17:40:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662210#M797145</guid>
      <dc:creator>Marc Ahrendt</dc:creator>
      <dc:date>2005-11-01T17:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662211#M797146</link>
      <description>When I started with my current company 8 years ago, virtually everyone had root access to the servers - 1st line support, 2nd line support, 3rd line unix admins (fair enough!) DBA's, system developers etc. - approximately 40 people.&lt;BR /&gt;&lt;BR /&gt;Since I moved to the 3rd line team, I've been cutting back on access piece by piece.  Needless to say, there have been complaints/concerns raised by people about this loss of access, but this has mostly been people worrying that they'll no longer be able to perform their jobs correctly.  A few weeks ago, I finally got it to the stage where only my team (who really need this access) know the passwords.  I've been fortunate to have management backing me up on this all the way too.&lt;BR /&gt;&lt;BR /&gt;As others have said - mistakes happen (we all make them, no matter how small).  The fewer people that have the capability to wreak havoc on the systems with a mis-typed command, the better.&lt;BR /&gt;&lt;BR /&gt;Clearly, you're in a fortunate position having only 2 of you really knowing the password to start with - people can't miss what they never had.&lt;BR /&gt;&lt;BR /&gt;Sudo, and similar products are an absolute must in most modern environments - apart from anything else, you have the capability to easily audit whatever commands are being executed.&lt;BR /&gt;&lt;BR /&gt;Another consideration that is now affecting many of us is Sarbanes-Oxley, and often internal/external security audits.  The controls that are now being insisted on are becoming ever more strict, so it's worth finding out what impact this is likely to have on your company if you don't already.&lt;BR /&gt;&lt;BR /&gt;All in all, it sounds to me like you have a good foundation to work from - don't give it up!</description>
      <pubDate>Tue, 01 Nov 2005 18:37:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662211#M797146</guid>
      <dc:creator>Chris Wilshaw</dc:creator>
      <dc:date>2005-11-01T18:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662212#M797147</link>
      <description>I too agree with the rest - only someone who is a sysadmin should be root.&lt;BR /&gt;&lt;BR /&gt;Use sudo to grant individual commands that others need to do on a repetitive basis - as long as they aren't destructive commands.&lt;BR /&gt;&lt;BR /&gt;Like, you may want power users to be able to kill others print jobs...&lt;BR /&gt;&lt;BR /&gt;Things like that.&lt;BR /&gt;&lt;BR /&gt;DON'T setuid!&lt;BR /&gt;&lt;BR /&gt;There should not be a reason to use root in order to keep applications up and running.&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Nov 2005 19:00:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662212#M797147</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2005-11-01T19:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662213#M797148</link>
      <description>I am the sole Unix admin in our organization, however, as I have a manager and a director that back me up, they have root access as well. Also, our helpdesk mgr acts as my backup and periodically is required to run scripts as root, but generally not. &lt;BR /&gt;&lt;BR /&gt;My manager defines security policy, my responsibility beyond the Unix system is to backup our Microsoft geeks, and in turn they back me up, so all told we have 8 people with root capability. &lt;BR /&gt;&lt;BR /&gt;I agree with Clay, as root job processing will take precedent. It is agreed practice that I will script and menu those items that may require root / wheel group level intervention..&lt;BR /&gt;&lt;BR /&gt;I've been with my company for 5 yrs, and have set my UX systems up within standard specs for L&amp;amp;nux, HP/UX, SunOS, and my manager preceded me in my position so. &lt;BR /&gt;&lt;BR /&gt;It is important to consider that when you have a system that there are some basic protocols for recovery and business continuity in the event you aren't there. This is another part of the scenario to consider. We worked hard at defining a business continuity plan. If god forbid the sys admin dies in a car crash, or is wiped out by a tornado, the business will need to keep plugging. Document the processes well.</description>
      <pubDate>Wed, 02 Nov 2005 09:20:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662213#M797148</guid>
      <dc:creator>rmueller58</dc:creator>
      <dc:date>2005-11-02T09:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662214#M797149</link>
      <description>If one really wants to be paranoid, you can take root away from EVERYONE, sys admins included.&lt;BR /&gt;&lt;BR /&gt;I read an article at one point in which the author said that no one in his shop knew the root password.  ALL sys admins did what they needed to do via sudo, which is entirely plausible.  Sudo does allow you a bit more logging and tracking of who is doing what.&lt;BR /&gt;&lt;BR /&gt;The author of the article ran a script that would change the root password once a day to some random string of characters and numbers.  If they absolutely had to log in as root, they would suspend the cron job, change the root password and do what they needed to do.&lt;BR /&gt;&lt;BR /&gt;Granted this case is extreme, but it is another option.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.samag.com/documents/s=9494/sam0502h/0502h.htm" target="_blank"&gt;http://www.samag.com/documents/s=9494/sam0502h/0502h.htm&lt;/A&gt;</description>
      <pubDate>Wed, 02 Nov 2005 09:29:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662214#M797149</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2005-11-02T09:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: who should have root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662215#M797150</link>
      <description>As everyone else has indicated, root capability, even with the sudo enabled root capability, should be dispensed with extreme care. In my organization, we have 6 admins who can have this kind of elevated privilege access. Of course everytime a consultant comes in to install a new software or do an upgrade, the conversation goes somthing like this:&lt;BR /&gt;&lt;BR /&gt;Consultant: "what's the root password ?" &lt;BR /&gt;Me: "huh ?"&lt;BR /&gt;C: "password for root, you know the superuser"&lt;BR /&gt;Me: "And your point is ??"&lt;BR /&gt;C: "I need to install/upgrade such and such and I need it"&lt;BR /&gt;Me: "No you don't!"&lt;BR /&gt;C: "Yes I do, here is the document which says I need root access"&lt;BR /&gt;Me: "That is a document that you have written for your convenience not necessarily a reflection of facts. Call me when you need root access. Here's my extension number. Bye..."&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;then 5 days into the process phone rings:&lt;BR /&gt;&lt;BR /&gt;C: "uuhhh, can you run the program (he is referrign to a script which sets a sticky bit on 3 executables) /usr/local/bin/root.sh ?&lt;BR /&gt;Me: "sure. (3 seconds later) done..."&lt;BR /&gt;C: "Thanks"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;And more often than not, I never hear back from him.&lt;BR /&gt;&lt;BR /&gt;Yes, if I had given him the root or equivalent access, it would have made his life much easier but at the same time, would have made mine much harder because he made a stupid typo somewhere, rendering my system useless. How many times someone unknowing with root privilege run a chmod -R on one of your vital filesystems and bring the system down to its knees ? &lt;BR /&gt;&lt;BR /&gt;So, word of caution: do not give the actual root password to anyone, even yourself (if you do not use it long enough you will also forget, believe me, especially if it is something cryptic as it should be) and dispense the sudo or similar functionality provided elevated privilege access with caution and with as fine granularity as you possibly can deal with.&lt;BR /&gt;&lt;BR /&gt;There's always a hotshot and they always find you to make your life miserable otherwise.</description>
      <pubDate>Wed, 02 Nov 2005 09:46:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/who-should-have-root-access/m-p/3662215#M797150</guid>
      <dc:creator>Mel Burslan</dc:creator>
      <dc:date>2005-11-02T09:46:27Z</dc:date>
    </item>
  </channel>
</rss>

