James G. Sack (jim) wrote:
Doug LaRue wrote:
** Reply to message from "James G. Sack (jim)" <[EMAIL PROTECTED]> on Tue, 08
Apr 2008 14:21:38 -0700

What is the effective difference in terms of security?
/var/log/auth.log

all sudo commands( logins, failed attamps, commands run, etc ) are
all logged there.  But then again, I don't know if or where root logins
and commands/failures/etc get logged on other systems.


Ahh, thanks Doug. I forgot to mention that. Having a complete log of
commands executed via sudo is another benefit of sudo vs running from a
root shell. This is particularly valuable on servers admin'd by multiple
   users with sudo rights. Even on a home system, it may turn out handy.

DJA- if you are asking whether there are differences in what can be done
via sudo compared to via a root shell -- that's what sudoers can
control. See
  man sudoers

The file /etc/sudoers has some helpful comments within, but I'm sure
there must be [ie, I haven't looked, though] some good tutorials on
configuring sudoer as well.


At Akamai we had some fairly complex sudoers files in order to control the amount of control the different admins had over various systems. Some admins had no clue how to deal with databases and were not allowed to run commands that would affect a DB, others were DBAs and had full access to DB servers. The easiest way to control who could do what was to not give all admins root access, setup various groups, and give those groups the necessary privileges in in the sudoers file.

Because (as has been stated) all commands issued using sudo are logged as to the actual user that executed them, a history was kept as to which admin did what and when (as compared to someone logging in as root, at which point you have no accountability and limited history).

PGA
--
Paul G. Allen, BSIT/SE
Owner, Sr. Engineer
Random Logic Consulting Services
www.randomlogic.com


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to