This is like the nuclear launch code thing.
You need two sets of keys.

The suggestion of a two stage sudo sounds
good.

        %group1  ALL=(root2)
        %group2  ALL=(root1)

        root2   ALL=(ALL) ALL
        root1   ALL=(ALL) ALL

group1 doesn't know root2's password
group2 doesn't know root1's password

You might want to turn off the cached
sudo authentication. (timestamp_timeout=0)

Someone has to set this up though.  They have to
be trusted.


Another might be to find / hack up a PAM module
to require two passwords.  sudo uses pam.

Another is http://www.pamusb.org/.  One mob has
the key and the others have the password. I don't
think this one is really workable.

In the 'not answering your specific question dept':
A possible solution this problem of mistrust
is to use 'sudosh'.  This is a shell which syslogs
all keystrokes made while sudo'd to a root shell.

Not sure how it works and never used it, but it
might be worth looking in to.

Matt

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to