Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-01-2005 01:55 PM
06-01-2005 01:55 PM
# Cmnd alias specification
Cmnd_Alias SYSTEMDOWN = /sbin/reboot, /usr/sbin/reboot, \
/sbin/halt, /sbin/poweroff, \
/sbin/shutdown, /sbin/init, /sbin/telinit
Cmnd_Alias SHELLS = /bin/sh, /bin/csh, /bin/ksh, \
/bin/tcsh, /usr/bin/rsh, \
/bin/zsh, /bin/ash, /bin/ash.static, \
/bin/bash, /bin/bash2, /bin/bsh,
Cmnd_Alias SU = /bin/su
# Defaults specification
# User privilege specification
testuser ALL=ALL,!SHELLS, !SYSTEMDOWN, !SU
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-01-2005 04:17 PM
06-01-2005 04:17 PM
Re: sudoers
Looks to my untrained eye like the user can do anything he/she wants.
boot
Shutdown
This person is just a regular user?
SEP
Contact form that mail's me offline:
http://www.isnamerica.com/contactsep.shtml
If you use the form, please tell me why you are emailing!!
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-01-2005 04:57 PM
06-01-2005 04:57 PM
Re: sudoers
in other words, the user can run other commands as root (that have been listed in sudoers already), EXCEPT those listed in SHELLS, SYSTEMDOWN or SU.
I don't see this as opening holes. I see it as closing a few if someone was doing dodgey sudoers.
But let me ask you this. Why does a user suddenly want you to add this, given that the machine has been running fine previously without it?
What reason did the user put forth for you to add such a line?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-01-2005 05:22 PM
06-01-2005 05:22 PM
Re: sudoers
Let me ask you this.. if you was a sysadmin and this user asks for sudo access as shown above, would you give it to him? I want to be polite and give him the access that he needs to do the work but I under no circumstance would like to give him any high level access. With the stuff above, wont he be able to sudo -s and inherit root? What exactly would he be able to do and what wont he be able to do?
Please give me some good explanation as I will assign good points to all that assist.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-01-2005 09:20 PM
06-01-2005 09:20 PM
SolutionIt looks like you have a big security loop hole. here is what i gathered from man page of sudoers
SECURITY NOTES
It is generally not effective to "subtract" commands from ALL using the â !â operator. A user can trivially circumvent this by copying the desired command to a different name and then executing that. For example:
bill ALL = ALL, !SU, !SHELLS
Doesnâ t really prevent bill from running the commands listed in SU or SHELLS since he can simply copy those commands to a different name, or use a shell escape from an editor or other program. Therefore, these kind of restrictions should be considered advisory at best (and reinforced by policy).
I hope you have understood what kind of security risk you are in now. please remove the access to him and if he really wants the access then take it up to the management and get their approval beforing giving access to him. Tomorrow no body should blame you for something which you have not done.
Rega
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-02-2005 02:28 AM
06-02-2005 02:28 AM