[comp.unix.wizards] Multiple Root ID's considered evil?

tchrist@convex.com (Tom Christiansen) (09/12/89)

Some site are known to have multiple uid 0 accounts so not 
everyone needs to know the root password.  I seem to recall
that this is considered a poor idea for security reasons.
Could someone please explain why?

thanks,

--tom


    Tom Christiansen                       {uunet,uiucdcs,sun}!convex!tchrist 
    Convex Computer Corporation                            tchrist@convex.COM
		 "EMACS belongs in <sys/errno.h>: Editor too big!"

gwyn@smoke.BRL.MIL (Doug Gwyn) (09/12/89)

In article <1723@convex.UUCP> tchrist@convex.com (Tom Christiansen) writes:
>Some site are known to have multiple uid 0 accounts so not 
>everyone needs to know the root password.  I seem to recall
>that this is considered a poor idea for security reasons.
>Could someone please explain why?

The main thing is that it doesn't make sense.  It is UID 0 that has
privileges, not username "root".

In any case, nobody should be logging in as "root".  You should set
up your system so that system administration can be done by some
nonprivileged UID.  UID 0 should only be assumed by carefully-checked
utilities that apply access controls.

tr@madeleine.ctt.bellcore.com (tom reingold) (09/12/89)

On the subject of "Multiple Root ID's considered evil?",
tchrist@convex.com (Tom Christiansen) writes:

$ Some site are known to have multiple uid 0 accounts so not 
$ everyone needs to know the root password.  I seem to recall
$ that this is considered a poor idea for security reasons.
$ Could someone please explain why?

The practice of having multiple privileged logins is criticized because
it is said that this gives the cracker more chances at cracking a
privileged password.

I disagree with this outlook.  While it is true that the cracker has
more chances, I think this is more than outweighed by several
advantages.  Primarily is that people -- who even trust each other --
don't share passwords.  Therefore, when you need to give out a
superuser password temporarily, you don't give out the one that
everyone knows and depends upon staying the same.  Instead you make a
temporary one and destroy it later, leaving the regular superuser
passwords in place.

Another small advantage, not to be counted upon heavily, is that
crackers who don't have your password file may start by assuming that
there is a "root" login and try to crack that password.  If you have a
"*" as the password field, you rest assured that the cracker can try
all he likes at that account.

Tom Reingold                   |INTERNET:       tr@bellcore.com
Bellcore                       |UUCP:           bellcore!tr
444 Hoes La room 1H217         |PHONE:          (201) 699-7058 [work],
Piscataway, NJ 08854-4182      |                (201) 287-2345 [home]

rayan@cs.toronto.edu (Rayan Zachariassen) (09/12/89)

gwyn@smoke.BRL.MIL (Doug Gwyn) writes:
>In any case, nobody should be logging in as "root".  You should set
>up your system so that system administration can be done by some
>nonprivileged UID.  UID 0 should only be assumed by carefully-checked
>utilities that apply access controls.

You have to be *very careful* in doing this, because of the assumption
spread throughout most unix code that uid 0 is the only one that should
be special-cased.  It is in general easier to break into non-0 accounts
due to such oversights in various ``secure'' code, and it is hard to
get rid of the problem areas.  The only long-term solution I see is a
user-configurable policy routine for each system, because people will do
things their own way no matter what and the security policy should adapt.

We did start out with most of our binaries owned by a non-0 id for
ideological reasons, but quickly reverted to root ownership because of
these problems.  It is easier to firewall root than a zoo of other ids.

gwyn@smoke.BRL.MIL (Doug Gwyn) (09/13/89)

In article <89Sep12.115240edt.2385@neat.cs.toronto.edu> rayan@cs.toronto.edu (Rayan Zachariassen) writes:
>We did start out with most of our binaries owned by a non-0 id for
>ideological reasons, but quickly reverted to root ownership because of
>these problems.  It is easier to firewall root than a zoo of other ids.

Yes, but the idea is to have a set-UID (0 in this case) program for
installing the software, not to turn loose humans with elevated permissions.

connelly@deimos.cis.ksu.edu (Paul Connelly) (09/13/89)

In article <1723@convex.UUCP> tchrist@convex.com (Tom Christiansen) writes:
>Some site are known to have multiple uid 0 accounts so not 
>everyone needs to know the root password.  I seem to recall
>that this is considered a poor idea for security reasons.
>Could someone please explain why?
>
uid 0 is root for all intents and purposes.  Passing out multiple
uid 0 accounts defeats the purpose in not letting other people
know "root"'s passwd.

bill@twwells.com (T. William Wells) (09/13/89)

In article <1723@convex.UUCP> tchrist@convex.com (Tom Christiansen) writes:
: Some site are known to have multiple uid 0 accounts so not
: everyone needs to know the root password.  I seem to recall
: that this is considered a poor idea for security reasons.
: Could someone please explain why?

If done for the reason you suggest, that is an _awful_ idea! Root is
root. Anyone who gets uid 0 is god. On the other hand, we have three
root logins: one that uses / as the home directory and does not do
any interesting stuff in its .profile and two for the root "user"
(one using the Bourne shell and one using the C shell) which gets a
normal user environment; we treat these accounts as the same account
and give them the same password. The first account is there so that
we have a root login that won't break just because some wierdness is
going on in the network. The others are used for normal root activity
(but we have C shell fanatics and Bourne shell fanatics and never the
twain shall meet. :-)

---
Bill                    { uunet | novavax | ankh | sunvice } !twwells!bill
bill@twwells.com

tcurrey@x102c.harris-atd.com (currey tom 76327) (09/13/89)

Today, everyone is very concerned about security measures to there
machine.  It seems to me that "root" is used for system maintience
more than anything else.  I agree that the root password must be
protected, but multiple uid 0 restricted logins are very helpful and
secure.

It is easy to write a small C program that calls specific commands under
specific conditions.  Make the executable the initial shell in the /etc/passwd 
file. Bingo, a protected controlled 0 uid process.  This does assume that
there are no backdoors or calls like "exec /bin/csh" in the code.  These 
shells become a definate advantage to control privilaged operations.

tchrist@convex.COM (Tom Christiansen) (09/13/89)

In article <1989Sep13.082607.981@twwells.com> bill@twwells.com (T. William Wells) writes:
>If done for the reason you suggest, that is an _awful_ idea! Root is
>root. Anyone who gets uid 0 is god. 

Certainly.  I perhaps misrepresented my reason.  The real reason was
to grant or remove superuser priv's to specific users without having 
to constantly muck with the One True Root Password.  I personally
don't do it that way at my site, preferring people to log in as 
themselves and su.

--tom


    Tom Christiansen                       {uunet,uiucdcs,sun}!convex!tchrist 
    Convex Computer Corporation                            tchrist@convex.COM
		 "EMACS belongs in <sys/errno.h>: Editor too big!"

bill@lxn.eds.com (Bill Doviak) (09/13/89)

In article <17601@bellcore.bellcore.com> tr@madeleine.UUCP (tom reingold) writes:
>On the subject of "Multiple Root ID's considered evil?",

>If you have a "*" as the password field, you rest assured that the cracker 
>can try all he likes at that account.

After checking both PASSWD(4) and PASSWD(1), I can't determine the signifcance
of an asterisk in the password field unless you wish to prevent logins
entirely for that account. Is this the intention or is there some other
purpose for the "*"?
-- 
Bill Doviak                         | US MAIL: Electronic Data Systems (EDS)
UUCP: vu-vlsi!lxn!bill              |          Lanark Building
 or   bill%lxn.uucp@rutgers.edu     |          Center Valley, PA  18034
 or   lehi3b15!lxn!bill             | Voice:   (215) 282-1213

pcf@galadriel.bt.co.uk (Pete French) (09/14/89)

From article <435@lxn.eds.com>, by bill@lxn.eds.com (Bill Doviak):
> 
> After checking both PASSWD(4) and PASSWD(1), I can't determine the signifcance
> of an asterisk in the password field unless you wish to prevent logins
> entirely for that account. Is this the intention or is there some other
> purpose for the "*"?

Yup - you gotit !

The star is 'traditional' for some reason. technically known as being
'starred out'.

-Pete.

-- 
       -Pete French.               |
  British Telecom Research Labs.   | "The carefree days are distant now,
 Martlesham Heath, East Anglia.    |  I wear my memories like a shroud..."
All my own thoughts (of course)    |                               -SIOUXSIE

envbvs@epb2.lbl.gov (Brian V. Smith) (09/15/89)

< > I perhaps misrepresented my reason.  The real reason was
< >to grant or remove superuser priv's to specific users without having 
< >to constantly muck with the One True Root Password.  I personally
< >don't do it that way at my site, preferring people to log in as 
< >themselves and su.
< 

< What's the diff?

That way you have an audit trail of people who have su'ed,
either in /var/log/authlog (SunOs4.0) or /usr/adm/sulog (Ultrix X.X).

_____________________________________
Brian V. Smith    (bvsmith@lbl.gov)
Lawrence Berkeley Laboratory
I don't speak for LBL, these non-opinions are all mine.

bph@buengc.BU.EDU (Blair P. Houghton) (09/15/89)

In article <1738@convex.UUCP> tchrist@convex.COM (Tom Christiansen) writes:
>In article <1989Sep13.082607.981@twwells.com> bill@twwells.com (T. William Wells) writes:
>>If done for the reason you suggest, that is an _awful_ idea! Root is
>>root. Anyone who gets uid 0 is god. 
>
>Certainly.  I perhaps misrepresented my reason.  The real reason was
>to grant or remove superuser priv's to specific users without having 
>to constantly muck with the One True Root Password.  I personally
>don't do it that way at my site, preferring people to log in as 
>themselves and su.

What's the diff?

				--Blair
				  "I hear a throng of voices,
				   all speaking those words,
				   voices that are not delayed
				   so much as the net propagation..."

cpcahil@virtech.UUCP (Conor P. Cahill) (09/15/89)

In article <4157@buengc.BU.EDU>, bph@buengc.BU.EDU (Blair P. Houghton) writes:
> In article <1738@convex.UUCP> tchrist@convex.COM (Tom Christiansen) writes:
> >Certainly.  I perhaps misrepresented my reason.  The real reason was
> >to grant or remove superuser priv's to specific users without having 
> >to constantly muck with the One True Root Password.  I personally
> >don't do it that way at my site, preferring people to log in as 
> >themselves and su.
> 
> What's the diff?

One big difference is that you do not have to pass out the single root
password to every user that needs root privileges.  This makes it 
simpler to maintain and/or control access to root privileges without
having to walk around the building giving everybody the password.

I have worked for clients that use this same functionality with a slight
bend.  They have a setuid root program that has a list of users and 
individual passwords (well protected, of course) that allow those users
to assume root privileges without having to pass out the root password.


These solutions are not used to distinguish the root account from other
0-id accounts, but just a managment tool for limiting the distribution 
of a single password.

-- 
+-----------------------------------------------------------------------+
| Conor P. Cahill     uunet!virtech!cpcahil      	703-430-9247	!
| Virtual Technologies Inc.,    P. O. Box 876,   Sterling, VA 22170     |
+-----------------------------------------------------------------------+

kencr@haddock.ima.isc.com (Kenny Crudup) (09/16/89)

From article <435@lxn.eds.com>, by bill@lxn.eds.com (Bill Doviak):
> After checking both PASSWD(4) and PASSWD(1), I can't determine the signifcance
> of an asterisk in the password field unless you wish to prevent logins
> entirely for that account. Is this the intention or is there some other
> purpose for the "*"?

In article <347@galadriel.bt.co.uk> pcf@galadriel.bt.co.uk (Pete French) says:
>Yup - you got it !
>The star is 'traditional' for some reason. technically known as being
>'starred out'.

One day while bored at work, I got out a piece of paper and traced back
the DES crypt routine for some popular combinations of salt/key. If
anyone is intrested, I have the passwords that make *, x, X, and 13 X's
and 13 x's work. Send me E-mail.

-- 
Kenneth R. Crudup, Contractor, Interactive Systems Co.(386/ix), Cambridge MA
Not all men are fools; some are still single! 	   Phone (617) 661 7474 x238
{encore, harvard, spdcc, think}!ima!haddock!kencr      kencr@ima.ima.isc.com

bph@buengc.BU.EDU (Blair P. Houghton) (09/16/89)

In article <347@galadriel.bt.co.uk> pcf@galadriel.bt.co.uk (Pete French) writes:
>From article <435@lxn.eds.com>, by bill@lxn.eds.com (Bill Doviak):
>> 
>> After checking both PASSWD(4) and PASSWD(1), I can't determine the
>>signifcance of an asterisk in the password field unless you wish to
>>prevent logins entirely for that account. Is this the intention or is
>>there some other purpose for the "*"?
>
>Yup - you gotit !
>
>The star is 'traditional' for some reason. technically known as being
>'starred out'.

But, and this is important, it's not perfect, or even very close.

With a * in the password field, and a hostname in his .rhosts, a user
can log in without a password from that "trusted" host.

Make up your own method to fix this.  I think I'll just rot13 the .rhosts
of people who "don't need" their access, after starring them out.

				--Blair
				  "Speaking from experience, of course..."

kencr@haddock.ima.isc.com (Kenny Crudup) (09/16/89)

You guys remember when I said.....
>One day while bored at work, I got out a piece of paper and traced back
>the DES crypt routine for some popular combinations of salt/key. If
>anyone is intrested, I have the passwords that make *, x, X, and 13 X's
>and 13 x's work. Send me E-mail.

Uh, people, I was *KIDDING*....... Trace back DES on *a piece of paper*??
/usr(/mail/kencr) on haddock is beginning to over-flow here. Besides....
s'impossible....

comp.unix.wizards indeed.... :-)

-- 
Kenneth R. Crudup, Contractor, Interactive Systems Co.(386/ix), Cambridge MA
Not all men are fools; some are still single! 	   Phone (617) 661 7474 x238
{encore, harvard, spdcc, think}!ima!haddock!kencr      kencr@ima.ima.isc.com

jfh@rpp386.Dallas.TX.US (John F. Haugh II) (09/17/89)

In article <14617@haddock.ima.isc.com> kencr@haddock.ima.isc.com (Kenny Crudup) writes:
>One day while bored at work, I got out a piece of paper and traced back
>the DES crypt routine for some popular combinations of salt/key. If
>anyone is intrested, I have the passwords that make *, x, X, and 13 X's
>and 13 x's work. Send me E-mail.

All valid passwords encode to 13 characters.  The strings '*', 'x', 'X',
and so on, all have no valid passwords.  In particular, the string '*'
is an impossible valid encryption as '*' is not even present in the output
alphabet since the alphabet is [a-zA-Z0-9./].  This is very important
since '*NO PASSWORD*' is 13 characters long.  It is also an impossible
encryption as both '*' and ' ' do not exist in the above alphabet!  This
is your best bet as a string to put in the password file as it documents
your intentions clearly.

I am wondering if Kenny has the clear-text for the string 'lotsabullshit'
on his notepad ;-)
-- 
John F. Haugh II                        +-Quote of the month club: ------------
VoiceNet: (512) 832-8832   Data: -8835  |  It's not that important,
InterNet: jfh@rpp386.cactus.org         |      it's only USENET.
UUCPNet:  {texbell|bigtex}!rpp386!jfh   +--------------     -- Rich $alz   ----

paul@uxc.cso.uiuc.edu (09/17/89)

Re: multiple su accounts:

By and large we don't use them here.  The exception is for people like me
who act as floating fire-fighter and network cowboy on several systems. 
Keeping track of the root password on machines administered by different
people isn't possible w.o. writing them down.  By having an individual su on
those machines (with a strong password that's regularly changed) I can
fix problems w.o. tracking down the sysadmin.  All of our systems allow
direct root login from the console only.

The Next machine has a good idea: anyone in group 0 may su using their own
password.  The key here is to make sure those people pick good passwords.
Once someone no longer needs root access, simply edit /etc/group to remove
their user-id from the 0 group.

         Paul Pomes
	 Univ of Illinois, CSO

night@pawl.rpi.edu (Trip Martin) (09/17/89)

In article <4183@buengc.BU.EDU> bph@buengc.bu.edu (Blair P. Houghton) writes:
>With a * in the password field, and a hostname in his .rhosts, a user
>can log in without a password from that "trusted" host.
>
>Make up your own method to fix this.  I think I'll just rot13 the .rhosts
>of people who "don't need" their access, after starring them out.

The method I've seen, and used on at least one occasion to plug that
hole is to make their login shell something that can't be executed,
usually /dev/null.  I think I can guarantee that no one's going to 
log in using that account without a login shell.  


Trip Martin  KA2LIV       night@pawl.rpi.edu
Finite state machinist    night@uruguay.acm.rpi.edu

gwyn@smoke.BRL.MIL (Doug Gwyn) (09/17/89)

In article <14617@haddock.ima.isc.com> kencr@haddock.ima.isc.com (Kenny Crudup) writes:
-One day while bored at work, I got out a piece of paper and traced back
-the DES crypt routine for some popular combinations of salt/key. If
-anyone is intrested, I have the passwords that make *, x, X, and 13 X's
-and 13 x's work. Send me E-mail.

I could believe XXXXXXXXXXXXX and xxxxxxxxxxxxx, but not a non-13 character
encrypted password.

mouse@mcgill-vision.UUCP (der Mouse) (09/17/89)

In article <17601@bellcore.bellcore.com>, tr@madeleine.ctt.bellcore.com (tom reingold) writes:
> On the subject of "Multiple Root ID's considered evil?",
> tchrist@convex.com (Tom Christiansen) writes:
>> Some site are known to have multiple uid 0 accounts so not everyone
>> needs to know the root password.  I seem to recall that this is
>> considered a poor idea for security reasons.  Could someone please
>> explain why?

> The practice of having multiple privileged logins is criticized
> because it is said that this gives the cracker more chances at
> cracking a privileged password.

This is perfectly true, and it's one of the things you must consider
when deciding what your security tradeoffs are.

> Another small advantage, not to be counted upon heavily, is that
> crackers who don't have your password file may start by assuming that
> there is a "root" login and try to crack that password.  If you have
> a "*" as the password field, you rest assured that the cracker can
> try all he likes at that account.

Anyone sophisticated enough to have much hope of cracking a password
given nothing but your passwd file is surely smart enough to search for
other super-user codes.  (And to not try to crack an uncrackable
password field!)

					der Mouse

			old: mcgill-vision!mouse
			new: mouse@larry.mcrcim.mcgill.edu

jeenglis@nunki.usc.edu (Joe English) (09/17/89)

kencr@haddock.ima.isc.com (Kenny Crudup) writes:
>One day while bored at work, I got out a piece of paper and traced back
>the DES crypt routine for some popular combinations of salt/key. If
>anyone is intrested, I have the passwords that make *, x, X, and 13 X's
>and 13 x's work. Send me E-mail.

Wow!  You must have been extremely bored...  But I'd
check your work, since the DES algorithm isn't supposed
to yield 1-character strings.

--Joe English

  jeenglis@nunki.usc.edu.  BTW, if you've got some spare time on
  your hands, could you factor 1001314159265692877 for me?
  Thanks.

bob@wyse.wyse.com (Bob McGowen Wyse Technology Training) (09/20/89)

In article <14617@haddock.ima.isc.com> kencr@haddock.ima.isc.com (Kenny Crudup) writes:
>From article <435@lxn.eds.com>, by bill@lxn.eds.com (Bill Doviak):
>> After checking both PASSWD(4) and PASSWD(1), I can't determine the signifcance
>> of an asterisk in the password field unless you wish to prevent logins
---deleted---
>One day while bored at work, I got out a piece of paper and traced back
>the DES crypt routine for some popular combinations of salt/key. If
>anyone is intrested, I have the passwords that make *, x, X, and 13 X's
>and 13 x's work. Send me E-mail.
>

I was under the impression (I do not remember from which document) that
an encrypted password would "ALWAYS" be 13 characters, which would imply
that *, x and X would never be generated and would therefore be totally
safe.  Is this wrong or am I missing some other information that isn't
in the docs?

Also, under XENIX the asterix has been replaced with NO LOGIN, which
certainly tells what is intended and is not equal to 13 characters.  Is
there any inherent danger in using this?

Thanks.

Bob McGowan  (standard disclaimer, these are my own ...)
Customer Education, Wyse Technology, San Jose, CA
..!uunet!wyse!bob
bob@wyse.com

rusty@cadnetix.COM (Rusty Carruth) (09/20/89)

In article <3812@helios.ee.lbl.gov> envbvs@epb2.lbl.gov (Brian V. Smith) writes:
>< >... preferring people to log in as 
>< >themselves and su.
>
>< What's the diff?
>
>That way you have an audit trail of people who have su'ed,
>either in /var/log/authlog (SunOs4.0) or /usr/adm/sulog (Ultrix X.X).
>
>Brian V. Smith    (bvsmith@lbl.gov)


However, I would like to remind you that, should someone become root
who wishes to hide that fact, and should /var/log/authlog be someplace
that the root-ed person can touch... well, lets just say that your
log means nothing in this case, since root can go edit that file
and remove the entries.  Or even change them to reference someone
else rather than themselves.

Nope, sorry, but once someone becomes root the logs mean nothing
if that person knows where they are (and how to change them).

I could tell you a long story about this as it relates to the
Univac 1100 series, but then this is 
	comp.UNIX.wizards....
	     ^^^^


---------- 
Rusty Carruth  UUCP:{uunet,boulder}!cadnetix!rusty  DOMAIN: rusty@cadnetix.com
Daisy/Cadnetix Corp. (303) 444-8075\  5775 Flatiron Pkwy. \ Boulder, Co 80301
Radio: N7IKQ    'home': P.O.B. 461 \  Lafayette, CO 80026

greg@tcnz2.tcnz.co.nz (super) (09/20/89)

There are some cases where multiple root id's are ok. We have various
root level logins with limited access right for certain tasks :-
full system backups - so that not permission hangups will lose a file
spooler - the /dev and various other directories are protected against
	any one less than root fooling around in them. The spooler sometimes
	needs to kill and restart devices with root permissions.
operator access - we have operators who can perform various functions such
	as killing all the processes for a terminal which is hung who we do not
	want to give full root access, and who we wish to be able to individually
	track their actions.

These are all restricted in how they can operate, and can gain access to only
very limited areas of the system. Works fine.

'Gotta get me a Telefunken u47 onna these days'
-- 
Greg Calkin                                   Thomas Cook N.Z. Limited,
...!uunet!vuwcomp!dsiramd!marcamd!tcnz2!greg  PO Box 24,  Auckland CPO,
or greg@tcnz.co.nz                            New Zealand. Phone (09)-793920

mrd@sun.soe.clarkson.edu (Michael DeCorte) (09/21/89)

In article <9560@cadnetix.COM> rusty@cadnetix.COM (Rusty Carruth) writes:

>However, I would like to remind you that, should someone become root
>who wishes to hide that fact, and should /var/log/authlog be someplace
>that the root-ed person can touch... well, lets just say that your
>log means nothing in this case, since root can go edit that file
 
True but sometimes is not a question of trust but I want a trail so
that I can say "Hey did you do this? Yeah... Well that ain't the way
to do it" (eg someone accidently blew away /dev/null and didn't
recreate it properly)

--

Michael DeCorte // H215-546-0497 W386-8164 Fax386-8252 // mrd@clutx.bitnet
2300 Naudain St. "H", Phil, PA 19146 // mrd@sun.soe.clarkson.edu
---------------------------------------------------------------------------
Clarkson Archive Server // commands = help, index, send, path
archive-server@sun.soe.clarkson.edu
archive-server%sun.soe.clarkson.edu@omnigate.bitnet
dumb1!dumb2!dumb3!smart!sun.soe.clarkson.edu!archive-server
---------------------------------------------------------------------------

davidsen@crdos1.crd.ge.COM (Wm E Davidsen Jr) (09/21/89)

I don't see anything wrong with multiple root logins. There are two main
areas of use, the first being limited root operations like shutdown or
backup, accessible to operators or trusted users, and the second being a
regular root login for each type of shell normally run on the machine.

Root is too powerful to trust users to either always change shells or
not to type the wrong thing by instinct. Many of the systems here have a
Korn shell login and in some cases a csh login as well. I see no virtue
in leaving anything manual which can be automated.

-- 
bill davidsen	(davidsen@crdos1.crd.GE.COM -or- uunet!crdgw1!crdos1!davidsen)
"The world is filled with fools. They blindly follow their so-called
'reason' in the face of the church and common sense. Any fool can see
that the world is flat!" - anon

barnett@crdgw1.crd.ge.com (Bruce Barnett) (09/21/89)

In article <7383@rpi.edu>, night@pawl (Trip Martin) writes:
>The method I've seen, and used on at least one occasion to plug that
>hole is to make their login shell something that can't be executed,
>usually /dev/null.  I think I can guarantee that no one's going to
>log in using that account without a login shell.

Just a small point: This will not affect someone using a TOPS account.
(TOPS is Sun's Mac file server software).
That is, if someone has an account and password, but the shell of /dev/null,
they can still use the TOPS account.

Also - I seen to recall that something complained when I used /dev/null.
Perhaps a log file. I have since then used /bin/true.
I don't know which technique is better.

--
Bruce G. Barnett	<barnett@crd.ge.com>   uunet!crdgw1!barnett

jc@minya.UUCP (John Chambers) (09/22/89)

In article <1989Sep13.082607.981@twwells.com>, bill@twwells.com (T. William Wells) writes:
> In article <1723@convex.UUCP> tchrist@convex.com (Tom Christiansen) writes:
> : Some site are known to have multiple uid 0 accounts so not
> : everyone needs to know the root password.  I seem to recall
> : that this is considered a poor idea for security reasons.
> : Could someone please explain why?
> 
> If done for the reason you suggest, that is an _awful_ idea! Root is
> root. Anyone who gets uid 0 is god. 

Not necessarily.  On several systems, I've installed special packages
for admin purposes that have to be super-users (have you ever tried to
do a backup in a non-root id?); the account had its own "shell" for the
use of novices, that held their hands and led them through some menus
that let them do only a few things.  It's pretty easy to make this quite
secure, as long as you don't let them do things like run a shell or vi
or such.  (Actually, I always include a shell escape; I just don't mention
it in the documentation.  Anyone who posts to this group would probably
guess the syntax the first time; the operators never guess it. ;-)

Another reason that I like to make new super-users is that I find it
much easier (and safer) to work in a familiar environment.  If I make
myself a super-user account with my home directory and the same shell,
then I don't get surprised by commands doing different things when I'm
su than when I'm myself.  Well, not quite; I won't say what I'd like 
to do to the geniuses who decide that commands like ls should behave
differently for user 0 than for all other users.  Let's just say that
it has on occasion had some very unpleasant consequences, which wouldn't
have happened if it had ignored the .* files like it's supposed to.  
It's especially annoying to think that the little monster wastes cpu 
cycles every time it's called, just so it can do this to me....

Recently I had a bit of fun at a place where I was doing some consulting.
I had the usual user account, and after a couple of weeks, I was asked
if I needed the root password for some things they'd asked me to do. I
said no; I'd already made myself a super-user account, and I preferred
to use it, since its environment was set up like I liked it.  They were
duly impressed....

[I'm just a boy named 'su' ;-]

-- 
#echo 'Opinions Copyright 1989 by John Chambers; for licensing information contact:'
echo '	John Chambers <{adelie,ima,mit-eddie}!minya!{jc,root}> (617/484-6393)'
echo ''
saying

harrys@tons61.UUCP (Harry Skelton) (09/22/89)

We have a problem of multible logins as root (actually su's since our login
program prohibits direct root access) and I was thinking of adding something
like the "session" program to the shell and have it save the session to
the console hardcopy printer - regarless!  I don't think the user will be
able to get rid of the hard copy without notice, change tty's in midwork,
nor get by the idea that a deamon opens a file for audit then unlink()'s it
while still open to hide it (fsck will fix it later in lost+found) and/or
the deamon can "add" an entry to the directory with the propper inode 
information...etc.

Some users try to remove the .history file but fsck picks it up later and
they don't know I keep a second copy elsewhere...:-)

I feel if security (or system) is so bad you need direct root access, then
have a lot of passwords involved!  Perhaps put the "root terminal" on a 
'dialup' device to force two passwords...etc.

Perhaps the best method is a hard copy terminal in a locked box (keys 
accessable though..).
-- 
Harry Skelton - Senior Systems Administrator - U.S. Dept. of Transportation
   ..!attctc!tons61!harrys ..!obdient!tons61!harrys ..!tfd!tons61!harrys
[  Views expressed by Harry Skelton are not those of the US Gov. or CBSI  ]

rcd@ico.ISC.COM (Dick Dunn) (09/26/89)

In article <114@tons61.UUCP>, harrys@tons61.UUCP (Harry Skelton) writes:
> We have a problem of multible logins as root (actually su's since our login
> program prohibits direct root access) and I was thinking of adding something
> like the "session" program to the shell and have it save the session to
> the console hardcopy printer - regarless!...

Be careful with approaches like this!  All too often, when you need to su,
it's because something has gotten thoroughly hosed up.  You have at least
one machine I/O-wedged, or CPU-wedged (or both, if it's one of *those*
days); you can't tell what's causing the problem, it gets worse by the
minute; you've GOT to get a few commands through to avoid bringing every-
thing to its knees.  In cases like this, you DON'T want a lot of baggage
hanging off everything you do as root.  You want to depend on the fact that
if only simple things are working, you can do simple things and get out of
the mess.  If you have to piece a system back together, you don't want some
magic which has to work before you can do it.  In short, you don't need
stuff going on behind your back...

>...I don't think the user will be
> able to get rid of the hard copy without notice, change tty's in midwork,
> nor get by the idea that a deamon opens a file for audit then unlink()'s...
[various additional precautionary games]

If you've got this sort of problem with people who have a root password, I
don't think you can solve it by administrative procedures.  If you need
this much distrust of people with root, your organization is broken.  That
is, you've got people problems.  In a UNIX environment with hostile users,
you don't give the hostile users a root password, period.
-- 
+---------+     Dick Dunn    rcd@ico.isc.com    ico!rcd      (303)449-2870
| In this |        4th annual MadHatterDay [10/6/89]:
|  style  |        A Kinder, Gentler Fool's Day
|__10/6___|