top | item 11864779

The sudo fraud

12 points| ilyash | 9 years ago |ilya-sher.org | reply

22 comments

order
[+] advisedwang|9 years ago|reply
Even with unlimited, no-password required sudo, it provides a valuable addition: audit logging.

every command you run with sudo is logged, along with the user than ran it. On GCP each end user is provisioned a separate login user, and logs can be shipped to Stackdriver Logging where they cannot be modified. This makes access really verifiable.

[+] sliken|9 years ago|reply
Seems silly. Why create a pain in the ass for every command, instead of enabling auditing? Of course you should log which ssh credential started the session.
[+] tubs|9 years ago|reply
disclaimer: I have no idea about Linux auditing: If you 'sudo -s' (or one of its friends) does the log still record the commands done in the "root shell"?
[+] organman91|9 years ago|reply
There's one very good reason to use sudo instead of being in a root shell: audit trails. sudo logs its invocations. While you could always see who is becoming root, you'd have to look through root's shell history to see what's happening (which isn't hard to purge - one of the many reasons a remote syslog server may be called for).
[+] sliken|9 years ago|reply
Why not enable auditing?
[+] dllthomas|9 years ago|reply
> Is it really simpler for you to type sudo all the time rather than having one terminal tab open with a root shell?

Yeesh. Privileged work I do is typically interleaved with commands that do not need to be privileged. Actual security considerations aside, I would rather have the guard rails afforded me by a normal user account for things that don't have some specific reason to be privileged.

[+] AstralStorm|9 years ago|reply
Technically, the main point for sudo is allowing non-root users access to a limited set of commands. That said, if you needed this, you should be using an actual MAC system.
[+] creshal|9 years ago|reply
sudo predates most (all?) Unix MAC solutions. Nowadays, PolKit can do most of its job in a more fine-grained way.
[+] jessaustin|9 years ago|reply
The argument-via-AWS probably indicts sudo, but it threatens in addition to indict any sort of command line access to production hosts. Why are you fixing your server with a typed command? Why not just kill it and spin up another?
[+] mh-cx|9 years ago|reply
On my severs I often use “sudo -s“ in a separate tmux window. I've changed my PS1 to give me a red prompt for root. Over the years I never had a situation where I accidentally did something stupid as root.
[+] _lce0|9 years ago|reply
It is so good to have visual clues. I do something similar, using..

    red = root
    yellow = others (or ssh)
    green = me
Plus when I'm SSH'ing to a remote box, it usually defaults to white prompt
[+] dllthomas|9 years ago|reply
I check in PROMPT_COMMAND whether the current terminal can sudo without a password and add a colored note to my prompt if so.
[+] apeacox|9 years ago|reply
The only thing I agreed was: "If you manage a server, use root". sudo is a good way to let unprivileged users to execute a restricted set of commands, it's easy to learn and setup.
[+] ilyash|9 years ago|reply
===8<== Update 2016-07-09 05:58 UTC

Just to be clear: Please note it’s filed under the “Rant” category. The post has some valid points but don’t take it too seriously. Use your best judgment to decide which parts of the above apply to your situation. ===8<===