Re: Configuring pam_tmpdir.so

2001-07-08 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > "Stefan" == Stefan Srdic <[EMAIL PROTECTED]> writes: Stefan> So far, I've successfully configure pam_smbpass.so to sync UNIX Stefan> and SAMBA passwords for my networked users. However, I was as Stefan> successfull in configuring pam_tmpdir.so t

Configuring pam_tmpdir.so

2001-07-08 Thread Stefan Srdic
Hey guys, I'm running Woody at Home and I've recently being messing around with a few PAM modules avaible from the Woody archives. So far, I've successfully configure pam_smbpass.so to sync UNIX and SAMBA passwords for my networked users. However, I was as successfull in configuring pam_tmpdir.so

Re: Configuring pam_tmpdir.so

2001-07-08 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > "Stefan" == Stefan Srdic <[EMAIL PROTECTED]> writes: Stefan> So far, I've successfully configure pam_smbpass.so to sync UNIX Stefan> and SAMBA passwords for my networked users. However, I was as Stefan> successfull in configuring pam_tmpdir.so

Configuring pam_tmpdir.so

2001-07-08 Thread Stefan Srdic
Hey guys, I'm running Woody at Home and I've recently being messing around with a few PAM modules avaible from the Woody archives. So far, I've successfully configure pam_smbpass.so to sync UNIX and SAMBA passwords for my networked users. However, I was as successfull in configuring pam_tmpdir.so

Re: shared root account

2001-07-08 Thread Andres Salomon
This is completely off-topic at this point, but there are a few uses of sudo. The original poster trusts his admins, and wants to give them all root privs without the hassle of having them all use one account. Sudo is not enforcing anything in this case, it is merely a) allowing convenience by al

Re: shared root account

2001-07-08 Thread Ross Thomas
- Original Message - From: "Robert L. Yelvington" <[EMAIL PROTECTED]> To: Sent: Friday, July 06, 2001 12:29 PM Subject: Re: shared root account > what's to stop a person, once they've sudo'd, from editing /etc/sudoers and > giving themselves more privs? This is a good reason to run LIDS

Re: shared root account

2001-07-08 Thread Andres Salomon
This is completely off-topic at this point, but there are a few uses of sudo. The original poster trusts his admins, and wants to give them all root privs without the hassle of having them all use one account. Sudo is not enforcing anything in this case, it is merely a) allowing convenience by a

Re: shared root account

2001-07-08 Thread Ross Thomas
- Original Message - From: "Robert L. Yelvington" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, July 06, 2001 12:29 PM Subject: Re: shared root account > what's to stop a person, once they've sudo'd, from editing /etc/sudoers and > giving themselves more privs? This is a goo

Re: shared root account

2001-07-08 Thread Rainer Weikusat
Eric E Moore <[EMAIL PROTECTED]> writes: > Ok, the amount of aiming away from your foot that you can do with > giving someone priveleges by giving them the root password is a proper > subset of the aiming away from your foot that you can do when > granting priveleges through sudo. Think of a daemo

Re: shared root account

2001-07-08 Thread Eric E Moore
> "Ethan" == Ethan Benson <[EMAIL PROTECTED]> writes: Ethan> On Sat, Jul 07, 2001 at 02:10:09AM +0100, Eric E Moore wrote: >> I would be very shocked if you could compromise a system with a >> sudoers entry of: me hostname = (root) /bin/cat Ethan> i would not, being able to read every file on

Re: shared root account

2001-07-08 Thread Rainer Weikusat
Eric E Moore <[EMAIL PROTECTED]> writes: > Ok, the amount of aiming away from your foot that you can do with > giving someone priveleges by giving them the root password is a proper > subset of the aiming away from your foot that you can do when > granting priveleges through sudo. Think of a daem

Re: shared root account

2001-07-08 Thread Eric E Moore
> "Ethan" == Ethan Benson <[EMAIL PROTECTED]> writes: Ethan> On Sat, Jul 07, 2001 at 02:10:09AM +0100, Eric E Moore wrote: >> I would be very shocked if you could compromise a system with a >> sudoers entry of: me hostname = (root) /bin/cat Ethan> i would not, being able to read every file o