On Mon, Jan 19, 2009 at 4:23 PM, Alan Altmark <alan_altm...@us.ibm.com> wrote:
>
> There is trust and there is Trust (the latter includes a measure of
> "personal integrity").  For those whom you Trust, root access is
> permitted, but do it by giving them all uid 0, not by sharing passwords.
> Since each user has a different pid, the audit trail can be more closely
> examined to see who did what.  (Watch out for a reducation program that
> gives you a username when you have shared uids.)

I have heard that suggestion before, and it appears to come from those
who never tried it. I recall that several things get messy when you
don't maintain a 1-to-1 mapping of names and uid 0. IIRC the reverse
mapping goes through the nscd cache and the result will change color
depending on who is looking. The most scary one is seeing yourself as
the owner of the file although you never created it. It also breaks
stuff that tests for root, and &deity knows what.

We were perfectly able to manage Linux systems and not use the root
account. Just sudo. As close to logonby and PROP as you can get. If
nothing else, it was good to end discussions when someone brought his
manager to convince us that he needed the root password: there is no
root password.

Most things go easy via sudo, and if you have more complicated things
you can invoke the shell with the -c option to issue one command (that
is being logged clearly). So the audit trail showed who issued what
command. It's not as good as a console log of a VM user that also
shows the output (but then you take care to keep things "visible" for
those that need to follow your steps and not issue commands from
XEDIT).

Rob

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to lists...@vm.marist.edu with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to