On Thursday 10 October 2002 12:38 am, Peter Leftwich appears to have 
written:
> On Thu, 10 Oct 2002, Bob Johnson wrote:
> > On Wednesday 09 October 2002 09:02 pm, Pranav A. Desai appears to 
have written:
> > > Hi! I have been asked to create admin accounts for a machine such
> > > that all of them can access that machine as root but with
> > > different username and password.
> >
> > In many environments, this is reasonable.  Sometimes you have
> > more than one person who is must have full administrative rights,
> > unless you plan to have your one administrator be on 24/7 call.  It
> > is good policy to prohibit anyone, even administrators, from
> > sharing accounts, so you give each admin their own account.  Of
> > course, if they only need limited admin rights, then sudo is
> > probably a better solution.  Talk to your customer and find out
> > what they are really trying to accomplish.
>
> man su
>

Yes, most facilities have admins login with their personal accounts 
and then su to root.  It is the traditional way, but doesn't answer the 
original question.  There is something to be said for being able to 
instantly change the root password without having to propagate a new 
password to the other admins who may be off duty, on vacation, or 
whatever.  E.G., what happens if an admin screws up and reveals their 
password to the world?  No, it isn't a perfect system, but I think the 
advantages outweigh the disadvantages.  My feelings won't be hurt if 
someone points out that I missed something obviously wrong with this.

I've also found it difficult to keep some admins from logging in at 
the console as root (because it's "too hard" to log in as a user and 
then su to root, and besides, that's how they've always done it).  You 
can't (or at least you probably don't want to) disable console logins 
by admin accounts, so the next best thing is to give each admin their 
own account and don't tell them the root password.  The point here 
isn't to keep a dishonest admin from hiding their tracks (it takes a 
lot more effort to do that, if you can do it at all), but to keep the 
lazy admins honest.

In my case it is actually site policy (created with no particular 
operating system in mind) that no two users, even admins, may share an 
account unless absolutely necessary.  I went ahead and set up to comply 
with the policy since I couldn't think of a reason not to, and I also 
agree that it is good policy.  We are trying to get people out of the 
habit of casually sharing passwords.

In any case, it's a tool that may be useful in some situations. 

> > The "toor" account is an example of exactly what you want, although
> > by default it is disabled (by an invalid password field).  To
> > create a similar account, use "vipw" to edit the password file. 
> > Copy the root entry, but give each person their own name and the
> > shell of their choice (the shell must be in /etc/shells).
>
> What -is- that toor (root backwards) account for anyways??
>

The toor account was originally an admin account with the bash shell.  
root used sh.  You do not (or did not at that time) want to set the root 
shell to be bash, it causes a bunch of not immediately obvious 
problems, so the toor account was created for those who like bash.
It took a few iterations to find the various utilities confused by 
multiple root accounts and fix them.

> Is there a command similar to vipw that uses a simpler editor, like
> pico?
>

No but you can change the default editor that vipw uses by 
setting the EDITOR variable.  

> > Leave everything else the same as for root.  If you copy the
> > password field from the root account, then the new admin account
> > will have the same password, which should be changed by the user of
> > the account. Also, never change the shell for root.  It needs to be
> > as it is for some things to work right.  That's why the toor
> > account exists: so you can set up an admin account with your choice
> > of shell.
>
> I always log in 100% of the time to my box as root and my shell is
> tcsh
>

That is generally considered to be a really bad thing.  If you screw 
up and issue a highly destructive command, nothing stops root 
from destroying your entire system.  If some attacker manages to 
gain access to your account, they own the entire system if your 
account is root.

> Does it matter that (I think) I changed the shell for root?
>

It can.  If the shell you selected is not in /bin, or it needs libraries 
that are not in /bin, you may find it difficult to fix problems that 
require you to interrupt a boot before all the drives are mounted.  
Thus, since bash is not in /bin, you want to create a second admin 
account (toor) if you happen to want to use bash as your admin shell.  
If it happens that that is no longer necessary, well, at least now you 
know the historical reason.

There used to be problems with some boot-time scripts not 
executing properly if the root shell wasn't sufficiently similar 
to sh, but I _think_ that's cleaned up now so that they all run 
in an explicitly specified shell.


[...remainder deleted...]

- Bob


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-questions" in the body of the message

Reply via email to