LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-16-2010, 02:51 AM   #1
camielcastillo
LQ Newbie
 
Registered: Nov 2010
Posts: 2

Rep: Reputation: 0
trimmed root privileges


Hi people,

I've been breaking my head over the following security issue. The company for which I work has a small number of linux servers hosting some application software. There are a handfull of administrators who use local root accounts of these machines to administrate them. Now, for security reasons I would like them to start using personal accounts which have the same privileges as root except privileges to alter users, groups and privleges, stop or start logging or have write access to the /var/log directories. Say a sort of trimmed root accounts (I would rather have more restrictions obviously, but at least this would be a start). This way, there is still a lot of damage that can be done with these accounts, but at least I can monitor them and trace undesired actions back to a responsible person when I recognise them, without someone using these accounts being able to dodge monitoring.

So far, the only way I can think of realising this is to create a new group, add four personal accounts, and change all the group ownerships for all the system files and commands except chown, chmod, /var/log and so forth. This seems a bit radical and pretty scary however. Any thougts on this problem?

Thanks and kind regards,

Camiel
 
Old 11-16-2010, 03:04 AM   #2
sysslack
Member
 
Registered: Feb 2006
Posts: 69

Rep: Reputation: 15
Hi!

There are of course many angles to the problem, but
one approach that comes to my mind is sudo.
http://www.gratisoft.us/sudo/intro.html

Last edited by sysslack; 11-16-2010 at 03:05 AM.
 
Old 11-16-2010, 03:12 AM   #3
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
Well in general, you'll want to look towards sudo to handle this I would say, much more graceful than messing with actual permissions. You need to be very careful with all this level of thing though, as there will pretty much *always* be a way around the things you want at that level. There will be a way to run a different shell as a different user to change the things via that account etc.

One angle I find interesting is that the more you technically enforce security within an administrative environment, the more it can be assumed by users that whatever is technically possible is acceptable. This contrasts to a written policy of self governance (to some extent) where the onus is much more on them thinking about what they are doing, and not doing it if they think they shouldn't. This therefore implicitly covers all these hacks and tricks that are hard / not feasible / impossible to cover. You can audit a lot of what's done and keep an eye on it for anomalies, and awareness of local admins that actions are being recorded also helps enforce a personal accountability.
 
Old 11-16-2010, 04:22 AM   #4
camielcastillo
LQ Newbie
 
Registered: Nov 2010
Posts: 2

Original Poster
Rep: Reputation: 0
Thanks!

Thanks guys, I think sudo will indeed do the trick.

acid_kewpie, good point there btw. Will take that into account as well.
 
Old 11-16-2010, 06:26 AM   #5
devnull10
Member
 
Registered: Jan 2010
Location: Lancashire
Distribution: Slackware Stable
Posts: 572

Rep: Reputation: 120Reputation: 120
Always rememeber with sudo though that unless you really tie it down, sudo can be used to wipe out your auditing features.
 
Old 11-16-2010, 07:47 AM   #6
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985Reputation: 1985
Quote:
Originally Posted by devnull10 View Post
Always rememeber with sudo though that unless you really tie it down, sudo can be used to wipe out your auditing features.
quite. In the last place I worked, an web application level team had sudo rights explicitly only allow a dozen or so things. Including rm, mv, vi and cat. So amongst many other obvious irrelevancies they had 100% technical ability to directly edit the sudoers file itself! Nice!
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Ssh root privileges gabsik Linux - Security 1 05-28-2008 10:19 PM
How to mount without root privileges? ni0wn Slackware 3 09-15-2004 05:03 PM
Can KDE be trimmed?? nny0000 General 4 08-11-2004 08:18 PM
User with root privileges ShakyJake Linux - Newbie 2 06-18-2004 12:12 PM
root privileges and permissions evil_lafta Slackware 7 08-20-2003 09:37 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:16 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration