On Fri, Sep 15, 2000 at 11:36:12PM -0800, Ethan Benson ([EMAIL PROTECTED])
wrote:
On Fri, Sep 15, 2000 at 11:55:23PM -0700, kmself@ix.netcom.com wrote:
Also, as this started off as a Debian thread somewhere/somehow, do you
have any suggestions for auditing a box through dpkg / apt,
You should have a look a osh:
$ apt-cache show osh
Package: osh
Priority: extra
Section: shells
Installed-Size: 67
Maintainer: Preston Smith [EMAIL PROTECTED]
Version: 1.7-6
Depends: libc6 (= 2.1.2), libncurses5, base-files (= 2.1.6)
Suggests: nvi
Architecture: i386
Size: 45946
MD5sum:
On Fri, Sep 15, 2000 at 04:38:11PM -0800, Ethan Benson ([EMAIL PROTECTED])
wrote:
On Fri, Sep 15, 2000 at 03:47:48PM -0700, kmself@ix.netcom.com wrote:
But you've got zero control of commands available, and no logging of
what commands are being run as root.
true, but this goes back to
On Fri, Sep 15, 2000 at 11:55:23PM -0700, kmself@ix.netcom.com wrote:
I'm aware of these limitations. You've got to work out acceptible
policies and risks while providing the tools to get the job done. The
problem I've had with direct root access is that users come on as root
fromsome
On Thu, Sep 14, 2000 at 03:11:42PM -0800, Ethan Benson ([EMAIL PROTECTED])
wrote:
On Thu, Sep 14, 2000 at 12:31:27PM -0700, kmself@ix.netcom.com wrote:
you could also accomplish this by creating mulitple uid=0 accounts
with different passwords, at least that way if Tim gets his user
password
On Fri, Sep 15, 2000 at 03:47:48PM -0700, kmself@ix.netcom.com wrote:
But you've got zero control of commands available, and no logging of
what commands are being run as root.
true, but this goes back to my original comment that allowing a user
account to run anything as sudo does nothing but
On Wed, Sep 13, 2000 at 10:23:14PM -0800, Ethan Benson ([EMAIL PROTECTED])
wrote:
On Wed, Sep 13, 2000 at 08:56:32PM -0700, Bob Nielsen wrote:
I use sudo, logged in as a regular user. It's generally considered a
security risk to be logged in as root, and a bit less of a risk to use
On Thu, Sep 14, 2000 at 12:31:27PM -0700, kmself@ix.netcom.com wrote:
The advantage in a multiuser environment is that you providing (and
controlling) root access at the user level rather than at the system
level. Eg, Tim, Bob, Alice, and Nate have access to a system. Tim,
Alice, and Nate
8 matches
Mail list logo