On Jul 10, 2007, at 1:15 AM, John Sonnenschein wrote:

> well, for one, sudo makes every user's password as valuable to an  
> attacker as root's. There's also the problem that a slightly  
> misconfigured sudo can give full root access to a potentially  
> malicious user. for example, allowing access to something which can  
> in some cases spawn a shell essentially makes that user root.
>
> RBAC on the other hand allows you to grant far more well-verified,  
> and infinitely finer grained ( for example, ACL's granting write  
> permissions to individual files ) privileges to a user.

I.e. sudo & RBAC hit different points on the security/convenience/ 
complexity curve.  My experiences in the bad, bad old days with VAX/ 
VMS make me deeply suspicious of "fine-grained" security, but I'm  
willing to believe things have improved.  However, I am far far from  
convinced that the world doesn't have a place for sudo, sensibly  
applied, and I *really* want to minimize the number of cases where we  
have to have dialogues of the form

LinuxHack: Aagh. XXX is missing, and I use it all the time.
SolarisGuru: You shouldn't want XXX, because Solaris has YYY which is  
better.

You know, if YYY is really better, your typical *n*x hack will figure  
this out pretty quick and stop using XXX.

> To be honest, I think doing away with the root account altogether  
> and replacing it with a half dozen administrative accounts would be  
> ideal. Once the initial shock of the new way of doing things was  
> over, it would be an ideal and wonderful change for both home users  
> and enterprise users over the 30 year old paradigm of (user |  
> superuser)

Um, can we decouple the blow-up-*n*x-security-and-rebuild-from-zero  
project from the make-Solaris-more-appealing-to-the-world project?  -Tim


_______________________________________________
indiana-discuss mailing list
indiana-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/indiana-discuss

Reply via email to