Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Security Practices question

  • From: Bradley Dunn
  • Date: Sun Sep 22 18:41:06 2002

On Sun, 22 Sep 2002, John M. Brown wrote:

> What is your learned opinion of having host accounts
> (unix machines) with UID/GID of 0:0 
> 
> otherwords
> 
> 
> jmbrown_r:password:0:0:John M. Brown:/export/home/jmbrown:/bin/mysh
> 
> 
> The argument is that way you don't hav to give out the root password,
> you can just nuke a users UID=0 equiv account when the leave and not
> have to change the real root account.

You'd need a tamper-proof host-based IDS monitoring every file to ensure the 
user doesn't install any trojans or backdoors. I assume you don't want to 
re-install the OS from trusted media every time you rmuser.

Using something like sudo would be a much better idea.

Bradley





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.