I finally solved local my user inability to "su -".  Here's a short
summary that'll hopefully help anybody else running into this problem.
There appear to be at least 2 files which can deny a user the ability to
"su -" if you are running shadow, not pam.  If you get blocked by either
one of them, you're blocked; period; end of story.

  The first file is /etc/login.defs, where I found the entry...
SU_WHEEL_ONLY   yes

  What do you *THINK* it means???  Unhhh, unhhh.  Immediately above it are
the comments...
#
# If "yes", the user must be listed as a member of the first gid 0 group
# in /etc/group (called "root" on most Linux systems) to be able to "su"
# to uid 0 accounts.  If the group doesn't exist or is empty, no one
# will be able to "su" to uid 0.
#
  In other words, it does *NOT* apply to members of wheel, but rather to
members of root (yes, there a *GROUP* called root).  If this entry is
set to yes, only members of "root" can "su -".  I strongly recommend
commenting it out.

  Then there's the "normal" /etc/suauth file which is where we expect
the control to be, specifically...

#
# Anyone else may not su to root unless in
# group wheel. This is how BSD does things.
#
root:ALL EXCEPT GROUP wheel:DENY

  If restriction is set in both files, then a user must be a member of
*BOTH* root and wheel, in order to su -.


  I wouldn't want those of you using PAM to feel left out.  In the
standard /etc/pam.d/su file, there are the following remarks...

# If you want to restrict users begin allowed to su even more,
# create /etc/security/suauth.allow (or to that matter) that is only
# writable by root, and add users that are allowed to su to that
# file, one per line.


-- 
Walter Dnes <[EMAIL PROTECTED]>
An infinite number of monkeys pounding away on keyboards will
eventually produce a report showing that Windows is more secure,
and has a lower TCO, than linux.
-- 
gentoo-user@gentoo.org mailing list

Reply via email to