On Fri, May 20, 2022, 7:28 PM David Wright <deb...@lionunicorn.co.uk> wrote:

> On Thu 19 May 2022 at 15:42:33 (-0500), Nicholas Geovanis wrote:
> > On Thu, May 19, 2022, 3:14 AM 황병희 <soyeo...@doraji.xyz> wrote:
> > > Tom Browder <tom.brow...@gmail.com> writes:
> > >
> > > > I need a special path setting for root after both "sudo" and "sudo
> > > > su." (...)
> > >
> > > Just you try like as "sudo su -". Sometimes i use it that way.
> > >
> >
> > When I need to use sudo or su to invoke executables, I fully qualify the
> > path to sudo and the path to that specific executable by using their full
> > path from /. And I often assign values to the important environment
> > variables at the beginning of that same command line. Like...
> >
> > joe="schmoe" slap="moe" /usr/bin/sudo ....
> >
> > The idea is to draw a line around that invocation by limiting what it
> > "knows".
>
> If you're running bash, then giving the full path for sudo will
> circumvent any aliases you've defined, and any other versions
> of sudo available from earlier in your $PATH, but there's not
> necessarily any security bonus. After Greg (2018):
>

Translation: There is no silver bullet that makes your system secure. There
are many steps large and small that make it incrementally more secure. Yes
that's true.

$ function /usr/bin/sudo { echo teehee; }
> $ /usr/bin/sudo whatever
> teehee
> $
>
> Cheers,
> David.
>
>

Reply via email to