When I need a root terminal, I tend to simply:
$sudo sh 

In a Solaris only environment I advise RBAC , but in a mixed Unix/Linux
world, sudo makes more sense.

With RBAC and root being a Role, we should "su - " to assume the root
role.



Mike


On Tue, 2011-06-14 at 14:24 -0700, Gregory Youngblood wrote:

> On Jun 14, 2011, at 1:35 PM, Gabriele Bulfon wrote:
> 
> > Up until OpenSolaris, my first and only command was some "enters" on a "#".
> > Just root, and just commands, for a life.
> > Now I had times with opensolaris wanting me to pfexec everything.
> > On OpenIndiana pfexec behave differently and does not run privileged as it 
> > did on OSol.
> > And, afterall, sudo just asks for your password once, and it's done 
> > forever....
> > At least for the "first" user you configure on OI.
> > Where is security here??
> 
> sudo "remembers" that you entered your password, and as long as you repeat 
> additional sudo command within the allowable time period, you do not have to 
> enter the password again. However, if you wait until that allowable time 
> period expires then sudo will prompt you for a password again (unless you 
> changed sudoers to not prompt for passwords again).
> 
> I don't know why (I remember reading about it, but have since forgotten) why 
> pfexec in OI behaves differently than it did for OS. It didn't matter to me 
> since sudo worked, but I preferred pfexec since I had become accustomed to 
> using it in OS, so I usually make my user primary administrator so pfexec 
> works again. It's a bit of a 2x4 approach, but it makes me happy. I'm sure 
> there are better/more elegant ways to accomplish the same thing. 
> 
> As for why I prefer pfexec to sudo, I don't really have a clear, rational 
> answer. It's my understanding pfexec works within the solaris/oi roles system 
> while sudo is just a pure password privilege escalation. I probably have that 
> wrong, so welcome correction.
> 
> As for security from sudo - it all depends on how you use it. In the default 
> form as installed the password has to be used to escalate privileges 
> initially and for a limited window of time. Assuming any compromise is not 
> the result of password compromise, it slows down the attacker's 
> effectiveness. Where sudo really shines, imo, is the ability to designate 
> safe commands that others can run.
> 
> Consider a group of developers given access to a test or staging server. The 
> developers are not given carte blanche to do anything they want on the 
> server, but they do need the ability to restart some app or service, such as 
> apache. Using sudo you can allow them to do "apachectl start", "apachectl 
> restart", "apachectl graceful", and "apachectl configtest" as the super user, 
> without permitting them to run any other command or apachectl with any other 
> options than the ones listed. It's a powerful tool for being able to fine 
> tune exactly what commands and options users are allowed to do with escalated 
> privileges.
> 
> Greg
> _______________________________________________
> OpenIndiana-discuss mailing list
> OpenIndiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss


_______________________________________________
OpenIndiana-discuss mailing list
OpenIndiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss

Reply via email to