edit root alias when installing the OS

Callum Lerwick seg at haxxed.com
Mon Jan 9 02:42:45 UTC 2006


On Sun, 2006-01-08 at 13:21 +1030, n0dalus wrote:
> If there are admins that you can't trust 100% with the root password,
> you shouldn't be giving them sudo access either (unless you really
> tighten down sudoers and deny-by-default, which probably won't come as
> a default configuration).

You use sudo because you can then revoke access to individual admins. If
everyone knows the root password, the only way to revoke access is to
change the root password. Then you have to inform all the other admins.

And if the root password is leaked? How do you know who leaked it? Who
do you fire? You may never know.

With sudo, you'll know who's password was leaked or cracked.

A multiple admin scenario is exactly why sudo exists.

> Weak passwords are not sudo's fault, but statistically the more users
> in sudoers the easier it becomes to get root access. It doesn't matter
> how strong the passwords are.

How many admins are you expecting here? The more admins you have, the
more sudo becomes preferable due to the above problem.

> Putting users by default into an
> allow-everything sudoers is weakening one of UNIX's most effective
> layers of security.

Wait, which one is that? Traditional unix's all-or-nothing approach to security is probably its biggest design flaw. (Hence why SELinux exists.)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://listman.redhat.com/archives/fedora-devel-list/attachments/20060108/40838fea/attachment.sig>


More information about the fedora-devel-list mailing list