<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: sudoers in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556196#M17944</link>
    <description>This section:&lt;BR /&gt;&lt;BR /&gt;Looks to my untrained eye like the user can do anything he/she wants.&lt;BR /&gt;&lt;BR /&gt;boot&lt;BR /&gt;&lt;BR /&gt;Shutdown&lt;BR /&gt;&lt;BR /&gt;This person is just a regular user?&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;Contact form that mail's me offline:&lt;BR /&gt;&lt;A href="http://www.isnamerica.com/contactsep.shtml" target="_blank"&gt;http://www.isnamerica.com/contactsep.shtml&lt;/A&gt;&lt;BR /&gt;If you use the form, please tell me why you are emailing!!</description>
    <pubDate>Wed, 01 Jun 2005 23:17:52 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2005-06-01T23:17:52Z</dc:date>
    <item>
      <title>sudoers</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556195#M17943</link>
      <description>Check this out. A user created a section in the sudoers file. Since I am a very new sysadmin, can one please explain to me exactly what kind of access he will get once I add this section to our sudeors file. Will this give him high level authority to the production systems? especially the last section. What do !! mean before the command?&lt;BR /&gt;&lt;BR /&gt;# Cmnd alias specification&lt;BR /&gt;&lt;BR /&gt;Cmnd_Alias      SYSTEMDOWN = /sbin/reboot, /usr/sbin/reboot, \&lt;BR /&gt;&lt;BR /&gt;                        /sbin/halt, /sbin/poweroff, \&lt;BR /&gt;&lt;BR /&gt;                        /sbin/shutdown, /sbin/init, /sbin/telinit&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;Cmnd_Alias      SHELLS = /bin/sh, /bin/csh, /bin/ksh, \&lt;BR /&gt;&lt;BR /&gt;                         /bin/tcsh, /usr/bin/rsh, \&lt;BR /&gt;&lt;BR /&gt;                         /bin/zsh, /bin/ash, /bin/ash.static, \&lt;BR /&gt;&lt;BR /&gt;                        /bin/bash, /bin/bash2, /bin/bsh, &lt;BR /&gt;&lt;BR /&gt;Cmnd_Alias      SU = /bin/su&lt;BR /&gt;&lt;BR /&gt;# Defaults specification&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;# User privilege specification&lt;BR /&gt;&lt;BR /&gt;testuser ALL=ALL,!SHELLS, !SYSTEMDOWN, !SU&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Jun 2005 20:55:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556195#M17943</guid>
      <dc:creator>Ragni Singh</dc:creator>
      <dc:date>2005-06-01T20:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: sudoers</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556196#M17944</link>
      <description>This section:&lt;BR /&gt;&lt;BR /&gt;Looks to my untrained eye like the user can do anything he/she wants.&lt;BR /&gt;&lt;BR /&gt;boot&lt;BR /&gt;&lt;BR /&gt;Shutdown&lt;BR /&gt;&lt;BR /&gt;This person is just a regular user?&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;Contact form that mail's me offline:&lt;BR /&gt;&lt;A href="http://www.isnamerica.com/contactsep.shtml" target="_blank"&gt;http://www.isnamerica.com/contactsep.shtml&lt;/A&gt;&lt;BR /&gt;If you use the form, please tell me why you are emailing!!</description>
      <pubDate>Wed, 01 Jun 2005 23:17:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556196#M17944</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-06-01T23:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: sudoers</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556197#M17945</link>
      <description>I take it as that user can't run (as root) any of the shutdown commands or shells.&lt;BR /&gt;&lt;BR /&gt;in other words, the user can run other commands as root (that have been listed in sudoers already), EXCEPT those listed in SHELLS, SYSTEMDOWN or SU.&lt;BR /&gt;&lt;BR /&gt;I don't see this as opening holes.  I see it as closing a few if someone was doing dodgey sudoers.&lt;BR /&gt;&lt;BR /&gt;But let me ask you this.  Why does a user suddenly want you to add this, given that the machine has been running fine previously without it?&lt;BR /&gt;&lt;BR /&gt;What reason did the user put forth for you to add such a line?</description>
      <pubDate>Wed, 01 Jun 2005 23:57:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556197#M17945</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-06-01T23:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: sudoers</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556198#M17946</link>
      <description>okay so here I go. This user works in developemnt and is a Linux expert. He has been fighting us to give him root access and so far I have been sucessful. I have been able to contain him by giving him sudo access to do work and if he needs more, I have done it for him. &lt;BR /&gt;&lt;BR /&gt;Let me ask you this.. if you was a sysadmin and this user asks for sudo access as shown above, would you give it to him? I want to be polite and give him the access that he needs to do the work but I under no circumstance would like to give him any high level access. With the stuff above, wont he be able to sudo -s and inherit root? What exactly would he be able to do and what wont he be able to do?&lt;BR /&gt;&lt;BR /&gt;Please give me some good explanation as I will assign good points to all that assist.</description>
      <pubDate>Thu, 02 Jun 2005 00:22:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556198#M17946</guid>
      <dc:creator>Ragni Singh</dc:creator>
      <dc:date>2005-06-02T00:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: sudoers</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556199#M17947</link>
      <description>&lt;BR /&gt;It looks like you have a big security loop hole. here is what i gathered from man page of sudoers&lt;BR /&gt;&lt;BR /&gt;&lt;SNIP&gt;&lt;BR /&gt;SECURITY NOTES&lt;BR /&gt;      It is generally not effective to "subtract" commands from ALL using the â  !â   operator.  A user can trivially circumvent this by copying the desired command to a different name and then executing that.  For       example:&lt;BR /&gt;  bill        ALL = ALL, !SU, !SHELLS&lt;BR /&gt;&lt;BR /&gt; Doesnâ  t really prevent bill from running the commands listed in SU or SHELLS since he can simply copy those commands to a different name, or use a shell escape from an editor or other program.  Therefore, these kind of restrictions should be considered advisory at best (and reinforced by policy).&lt;BR /&gt;&lt;SNIP&gt;&lt;BR /&gt;&lt;BR /&gt;I hope you have understood what kind of security risk you are in now. please remove the access to him and if he really wants the access then take it up to the management and get their approval beforing giving access to him. Tomorrow no body should blame you for something which you have not done.&lt;BR /&gt;&lt;BR /&gt;Rega&lt;/SNIP&gt;&lt;/SNIP&gt;</description>
      <pubDate>Thu, 02 Jun 2005 04:20:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556199#M17947</guid>
      <dc:creator>Gopi Sekar</dc:creator>
      <dc:date>2005-06-02T04:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: sudoers</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556200#M17948</link>
      <description>Thanks, you get a BIG 10.</description>
      <pubDate>Thu, 02 Jun 2005 09:28:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sudoers/m-p/3556200#M17948</guid>
      <dc:creator>Ragni Singh</dc:creator>
      <dc:date>2005-06-02T09:28:36Z</dc:date>
    </item>
  </channel>
</rss>

