Re: shared root account

2001-07-06 Thread Steven Barker
On Sat, Jul 07, 2001 at 12:11:44AM -0600, Will Aoki wrote: > On Sat, Jul 07, 2001 at 02:10:09AM +0100, Eric E Moore wrote: > [cut] > > I would be very shocked if you could compromise a system with a > > sudoers entry of: > > me hostname = (root) /bin/cat > > Depends on what's on the system. I've

Re: shared root account

2001-07-06 Thread Will Aoki
On Sat, Jul 07, 2001 at 02:10:09AM +0100, Eric E Moore wrote: [cut] > I would be very shocked if you could compromise a system with a > sudoers entry of: > me hostname = (root) /bin/cat Depends on what's on the system. I've thought of four similar ways. 1: With Kerberos, you can steal someone'

Re: shared root account

2001-07-06 Thread Matt Hope
On Fri, 06 Jul 2001, Juha J?ykk? <[EMAIL PROTECTED]> wrote... : > > (Put the public key in the .authorized_keys file for the root user) : > > TUrn on RSA/DSA authentication and 'allow root login' : > One word of warning aboce would allow logging in using root password as well : : I distrust a

Re: shared root account

2001-07-06 Thread Nathan E Norman
On Fri, Jul 06, 2001 at 03:24:56PM -0800, Ethan Benson wrote: > On Fri, Jul 06, 2001 at 09:43:55AM -0500, Nathan E Norman wrote: > > > > OTOH if you restrict the user to a list of commands in /etc/sudoers, > > it's wise to consider whether the user might be able to leverage one of > > those comman

Re: shared root account

2001-07-06 Thread Eric E Moore
> "Ethan" == Ethan Benson <[EMAIL PROTECTED]> writes: Ethan> or even seemingly innocuous things like less or even cat. Less is a problem, yes, as is anything else with a shell escape. Ethan> sudo less anything !/bin/sh whoami r00t! Ethan> echo me ALL=ALL > s sudo 'cat s >> /etc/sudoers' do

Re: shared root account

2001-07-06 Thread Nathan E Norman
On Fri, Jul 06, 2001 at 03:24:56PM -0800, Ethan Benson wrote: > On Fri, Jul 06, 2001 at 09:43:55AM -0500, Nathan E Norman wrote: > > > > OTOH if you restrict the user to a list of commands in /etc/sudoers, > > it's wise to consider whether the user might be able to leverage one of > > those comma

Re: shared root account

2001-07-06 Thread Simon Huggins
On Fri, Jul 06, 2001 at 06:15:43AM -0800, Ethan Benson wrote: > the main reason i don't use sudo except for small things which cannot > grant a root shell in any way is for the simple reason the sudo > converts a normal unprivleged user password into another root > password. Any user account tha

Re: shared root account

2001-07-06 Thread Vineet Kumar
You make a good point, even if one of your examples is flawed: $ sudo 'cat s >> /etc/sudoers' sudo: cat s >> /etc/sudoers: command not found sudo is a very useful tool in the type of situation described in this thread. Even if you give everyone ALL=(ALL) ALL, it's better than su or even .ssh/auth

Re: shared root account

2001-07-06 Thread Ethan Benson
On Fri, Jul 06, 2001 at 09:43:55AM -0500, Nathan E Norman wrote: > > OTOH if you restrict the user to a list of commands in /etc/sudoers, > it's wise to consider whether the user might be able to leverage one of > those commands to edit /etc/sudoers (or any other file). If you're > going to list

Re: shared root account

2001-07-06 Thread Eric E Moore
> "Ethan" == Ethan Benson <[EMAIL PROTECTED]> writes: Ethan> or even seemingly innocuous things like less or even cat. Less is a problem, yes, as is anything else with a shell escape. Ethan> sudo less anything !/bin/sh whoami r00t! Ethan> echo me ALL=ALL > s sudo 'cat s >> /etc/sudoers' d

Re: shared root account

2001-07-06 Thread Simon Huggins
On Fri, Jul 06, 2001 at 06:15:43AM -0800, Ethan Benson wrote: > the main reason i don't use sudo except for small things which cannot > grant a root shell in any way is for the simple reason the sudo > converts a normal unprivleged user password into another root > password. Any user account th

Re: shared root account

2001-07-06 Thread Vineet Kumar
You make a good point, even if one of your examples is flawed: $ sudo 'cat s >> /etc/sudoers' sudo: cat s >> /etc/sudoers: command not found sudo is a very useful tool in the type of situation described in this thread. Even if you give everyone ALL=(ALL) ALL, it's better than su or even .ssh/aut

Re: shared root account

2001-07-06 Thread Ethan Benson
On Fri, Jul 06, 2001 at 09:43:55AM -0500, Nathan E Norman wrote: > > OTOH if you restrict the user to a list of commands in /etc/sudoers, > it's wise to consider whether the user might be able to leverage one of > those commands to edit /etc/sudoers (or any other file). If you're > going to list

Re: shared root account

2001-07-06 Thread Jason Healy
At 994418143s since epoch (07/06/01 10:15:43 -0400 UTC), Ethan Benson wrote: > On Fri, Jul 06, 2001 at 09:18:18AM -0400, Jason Healy wrote: > > types of > > passwords accepted to run root commands, etc). > > elaborate. > > the main reason i don't use sudo except for small things which cannot > gr

Re: shared root account

2001-07-06 Thread Thomas Bushnell, BSG
Juha Jäykkä <[EMAIL PROTECTED]> writes: > Any other ideas? Or is it really safe to allow root logins to sshd? > It is just an old rule of thumb that root must never log on over the > wire but that may be old news from times of telnet - never had any > need of root logins over the wire until perh

Unidentified subject!

2001-07-06 Thread John DOE
Hello, I am a new debian user and someone still learning linux. I have a small problem. In my company ( which is a microsoft developer ) I insisted on using a firewall created with Ipchains of 3 zones ( dmz - local - internet ) on a Intel Pentium Pro processor machine running Debian 2.2r3 on i

Re: shared root account

2001-07-06 Thread Jason Healy
At 994418143s since epoch (07/06/01 10:15:43 -0400 UTC), Ethan Benson wrote: > On Fri, Jul 06, 2001 at 09:18:18AM -0400, Jason Healy wrote: > > types of > > passwords accepted to run root commands, etc). > > elaborate. > > the main reason i don't use sudo except for small things which cannot > g

Re: shared root account

2001-07-06 Thread Thomas Bushnell, BSG
Juha Jäykkä <[EMAIL PROTECTED]> writes: > Any other ideas? Or is it really safe to allow root logins to sshd? > It is just an old rule of thumb that root must never log on over the > wire but that may be old news from times of telnet - never had any > need of root logins over the wire until per

Attack alert from snort

2001-07-06 Thread Philippe Clérié
I got the following from snort : Active System Attack Alerts =-=-=-=-=-=-=-=-=-=-=-=-=-= Jul 6 07:48:19 canopus snort[3884]: spp_http_decode: IIS Unicode attack detected: 128.95.75.153:1647 -> 208.52.11.121:80 Active System Attack Alerts =-=-=-=-=-=-=-=-=-=-=-=-=-= Jul 6 05:36:39 canopus snort[

Re: shared root account

2001-07-06 Thread Nathan E Norman
On Fri, Jul 06, 2001 at 09:29:54AM -0700, Robert L. Yelvington wrote: > admittedly, i am not very familiar with sudo because i have never seen the > practical advantages of making su'ing more of a hassle by having to manage > another set of conf files and keeping track of who's a sudoer and, > ther

Re: shared root account

2001-07-06 Thread Tim Haynes
"Robert L. Yelvington" <[EMAIL PROTECTED]> writes: > what's to stop a person, once they've sudo'd, from editing /etc/sudoers and > giving themselves more privs? sudo is to stop them, perhaps? ~Tim -- 15:40:15 up 9 days, 23:50, 12 users, load average: 0.19, 0.04, 0.01 [EMAIL PROTECTED] |The

Re: shared root account

2001-07-06 Thread Robert L. Yelvington
admittedly, i am not very familiar with sudo because i have never seen the practical advantages of making su'ing more of a hassle by having to manage another set of conf files and keeping track of who's a sudoer and, therefore, have chosen not to use it. what's to stop a person, once they've sudo'

Re: shared root account

2001-07-06 Thread Ethan Benson
On Fri, Jul 06, 2001 at 09:18:18AM -0400, Jason Healy wrote: > types of > passwords accepted to run root commands, etc). elaborate. the main reason i don't use sudo except for small things which cannot grant a root shell in any way is for the simple reason the sudo converts a normal unprivleged u

Re: shared root account

2001-07-06 Thread Steve Greenland
On 06-Jul-01, 05:34 (CDT), Patrice Neff <[EMAIL PROTECTED]> wrote: > What you want to accomplish might be possible with sudo. Install sudo > and thenn add the following line to the configuration > file. (/etc/sudoers on my machine) > ALL=(ALL) ALL > > this will allow you to execute any c

Re: shared root account

2001-07-06 Thread Jason Healy
At 994443564s since epoch (07/06/01 06:19:24 -0400 UTC), Juha J?ykk? wrote: > I distrust allowing root logins from anywhere but local console(s) > or non-modem gettys i.e. from anywhere over the not-owned-by-me cable. > Any other ideas? Or is it really safe to allow root logins to sshd? > It is

Unidentified subject!

2001-07-06 Thread John DOE
Hello, I am a new debian user and someone still learning linux. I have a small problem. In my company ( which is a microsoft developer ) I insisted on using a firewall created with Ipchains of 3 zones ( dmz - local - internet ) on a Intel Pentium Pro processor machine running Debian 2.2r3

Attack alert from snort

2001-07-06 Thread Philippe Clérié
I got the following from snort : Active System Attack Alerts =-=-=-=-=-=-=-=-=-=-=-=-=-= Jul 6 07:48:19 canopus snort[3884]: spp_http_decode: IIS Unicode attack detected: 128.95.75.153:1647 -> 208.52.11.121:80 Active System Attack Alerts =-=-=-=-=-=-=-=-=-=-=-=-=-= Jul 6 05:36:39 canopus snort

Re: shared root account

2001-07-06 Thread Nathan E Norman
On Fri, Jul 06, 2001 at 09:29:54AM -0700, Robert L. Yelvington wrote: > admittedly, i am not very familiar with sudo because i have never seen the > practical advantages of making su'ing more of a hassle by having to manage > another set of conf files and keeping track of who's a sudoer and, > the

Re: shared root account

2001-07-06 Thread Tim Haynes
"Robert L. Yelvington" <[EMAIL PROTECTED]> writes: > what's to stop a person, once they've sudo'd, from editing /etc/sudoers and > giving themselves more privs? sudo is to stop them, perhaps? ~Tim -- 15:40:15 up 9 days, 23:50, 12 users, load average: 0.19, 0.04, 0.01 [EMAIL PROTECTED] |The

Re: shared root account

2001-07-06 Thread Robert L. Yelvington
admittedly, i am not very familiar with sudo because i have never seen the practical advantages of making su'ing more of a hassle by having to manage another set of conf files and keeping track of who's a sudoer and, therefore, have chosen not to use it. what's to stop a person, once they've sudo

Re: shared root account

2001-07-06 Thread Ethan Benson
On Fri, Jul 06, 2001 at 09:18:18AM -0400, Jason Healy wrote: > types of > passwords accepted to run root commands, etc). elaborate. the main reason i don't use sudo except for small things which cannot grant a root shell in any way is for the simple reason the sudo converts a normal unprivleged

Re: shared root account

2001-07-06 Thread Steve Greenland
On 06-Jul-01, 05:34 (CDT), Patrice Neff <[EMAIL PROTECTED]> wrote: > What you want to accomplish might be possible with sudo. Install sudo > and thenn add the following line to the configuration > file. (/etc/sudoers on my machine) > ALL=(ALL) ALL > > this will allow you to execute any

Re: shared root account

2001-07-06 Thread Jason Healy
At 994443564s since epoch (07/06/01 06:19:24 -0400 UTC), Juha J?ykk? wrote: > I distrust allowing root logins from anywhere but local console(s) > or non-modem gettys i.e. from anywhere over the not-owned-by-me cable. > Any other ideas? Or is it really safe to allow root logins to sshd? > It i

Re: shared root account

2001-07-06 Thread Patrice Neff
Juha Jäykkä <[EMAIL PROTECTED]> writes: > How can that _safely_ be accomplished? There are versions of su, > sudo etc) that do not ask passwords, there are suid binaries but > which is _THE_ way of accomplishing this? I've never been in a situation like yours. But I can tell how I do it at home.

Re: shared root account

2001-07-06 Thread Daniel Polombo
Just a friendly Jedi Knight wrote: On Fri, Jul 06, 2001 at 01:19:24PM +0300, Juha Jäykkä wrote: I distrust allowing root logins from anywhere but local console(s) or non-modem gettys i.e. from anywhere over the not-owned-by-me cable. umm do You want to run in circles from one machine to an

Re: shared root account

2001-07-06 Thread Patrick Dreker
Am Freitag, 6. Juli 2001 12:19 schrieb Juha Jäykkä: > > > (Put the public key in the .authorized_keys file for the root user) > > > TUrn on RSA/DSA authentication and 'allow root login' > > > > One word of warning aboce would allow logging in using root password as > > well > > I distrust allowi

Re: shared root account

2001-07-06 Thread Just a friendly Jedi Knight
On Fri, Jul 06, 2001 at 01:19:24PM +0300, Juha Jäykkä wrote: > I distrust allowing root logins from anywhere but local console(s) > or non-modem gettys i.e. from anywhere over the not-owned-by-me cable. umm do You want to run in circles from one machine to another? ;o)) if not than You need to

Re: shared root account

2001-07-06 Thread Juha Jäykkä
> > (Put the public key in the .authorized_keys file for the root user) > > TUrn on RSA/DSA authentication and 'allow root login' > One word of warning aboce would allow logging in using root password as well I distrust allowing root logins from anywhere but local console(s) or non-modem gettys

Re: shared root account

2001-07-06 Thread Just a friendly Jedi Knight
On Fri, Jul 06, 2001 at 11:35:16AM +0200, Mark Janssen wrote: > > (Put the public key in the .authorized_keys file for the root user) > TUrn on RSA/DSA authentication and 'allow root login' One word of warning aboce would allow logging in using root password as well which might not be the best s

Re: shared root account

2001-07-06 Thread Just a friendly Jedi Knight
> On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha Jäykkä wrote: > > > I have a bit of a situation: I have a handful of linux machines > > (almost all with different distributions and kernels and software - > > one hell to keep secure) and all the machines have different roots. > > These guys want

Re: shared root account

2001-07-06 Thread Mark Janssen
On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha J?ykk? wrote: > I have a bit of a situation: I have a handful of linux machines > (almost all with different distributions and kernels and software - .. > time (we all know keeping up security is a fulltime job). Obviously to > install patches etc I,

Re: shared root account

2001-07-06 Thread Saku Ytti
On Fri, Jul 06, 2001 at 12:25:20PM +0300, Saku Ytti wrote: > On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha Jäykkä wrote: > > Make multiple root-accounts. We for example have normal users > accounts and 3-5 root-accounts depending on machine. Just give > UID/GID to new user. Insert 0 where approp

Re: shared root account

2001-07-06 Thread Saku Ytti
On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha Jäykkä wrote: Make multiple root-accounts. We for example have normal users accounts and 3-5 root-accounts depending on machine. Just give UID/GID to new user. > I have a bit of a situation: I have a handful of linux machines > (almost all with dif

shared root account

2001-07-06 Thread Juha Jäykkä
I have a bit of a situation: I have a handful of linux machines (almost all with different distributions and kernels and software - one hell to keep secure) and all the machines have different roots. These guys want to keep their root passwords (or at least the root privileges) so they can update

Re: shared root account

2001-07-06 Thread Patrice Neff
Juha Jäykkä <[EMAIL PROTECTED]> writes: > How can that _safely_ be accomplished? There are versions of su, > sudo etc) that do not ask passwords, there are suid binaries but > which is _THE_ way of accomplishing this? I've never been in a situation like yours. But I can tell how I do it at home.

Re: shared root account

2001-07-06 Thread Daniel Polombo
Just a friendly Jedi Knight wrote: > On Fri, Jul 06, 2001 at 01:19:24PM +0300, Juha Jäykkä wrote: > >> I distrust allowing root logins from anywhere but local console(s) >>or non-modem gettys i.e. from anywhere over the not-owned-by-me cable. >> > umm do You want to run in circles from one mac

Re: shared root account

2001-07-06 Thread Patrick Dreker
Am Freitag, 6. Juli 2001 12:19 schrieb Juha Jäykkä: > > > (Put the public key in the .authorized_keys file for the root user) > > > TUrn on RSA/DSA authentication and 'allow root login' > > > > One word of warning aboce would allow logging in using root password as > > well > > I distrust allow

Re: shared root account

2001-07-06 Thread Just a friendly Jedi Knight
On Fri, Jul 06, 2001 at 01:19:24PM +0300, Juha Jäykkä wrote: > I distrust allowing root logins from anywhere but local console(s) > or non-modem gettys i.e. from anywhere over the not-owned-by-me cable. umm do You want to run in circles from one machine to another? ;o)) if not than You need to

Re: shared root account

2001-07-06 Thread Juha Jäykkä
> > (Put the public key in the .authorized_keys file for the root user) > > TUrn on RSA/DSA authentication and 'allow root login' > One word of warning aboce would allow logging in using root password as well I distrust allowing root logins from anywhere but local console(s) or non-modem getty

Re: shared root account

2001-07-06 Thread Just a friendly Jedi Knight
On Fri, Jul 06, 2001 at 11:35:16AM +0200, Mark Janssen wrote: > > (Put the public key in the .authorized_keys file for the root user) > TUrn on RSA/DSA authentication and 'allow root login' One word of warning aboce would allow logging in using root password as well which might not be the best

Re: shared root account

2001-07-06 Thread Just a friendly Jedi Knight
> On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha Jäykkä wrote: > > > I have a bit of a situation: I have a handful of linux machines > > (almost all with different distributions and kernels and software - > > one hell to keep secure) and all the machines have different roots. > > These guys wan

Re: shared root account

2001-07-06 Thread Mark Janssen
On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha J?ykk? wrote: > I have a bit of a situation: I have a handful of linux machines > (almost all with different distributions and kernels and software - .. > time (we all know keeping up security is a fulltime job). Obviously to > install patches etc I

Re: shared root account

2001-07-06 Thread Saku Ytti
On Fri, Jul 06, 2001 at 12:25:20PM +0300, Saku Ytti wrote: > On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha Jäykkä wrote: > > Make multiple root-accounts. We for example have normal users > accounts and 3-5 root-accounts depending on machine. Just give > UID/GID to new user. Insert 0 where appro

Re: shared root account

2001-07-06 Thread Saku Ytti
On Fri, Jul 06, 2001 at 12:15:43PM +0300, Juha Jäykkä wrote: Make multiple root-accounts. We for example have normal users accounts and 3-5 root-accounts depending on machine. Just give UID/GID to new user. > I have a bit of a situation: I have a handful of linux machines > (almost all with di

shared root account

2001-07-06 Thread Juha Jäykkä
I have a bit of a situation: I have a handful of linux machines (almost all with different distributions and kernels and software - one hell to keep secure) and all the machines have different roots. These guys want to keep their root passwords (or at least the root privileges) so they can updat