Security Implications of Giving Root Access to Group of Untrusted Users

bagasme

New Member
Joined
Oct 17, 2019
Messages
4
Reaction score
0
Credits
0
Hello all,

Let's say that on a production system, a sysadmin configure /etc/sudoers with following entry:

Code:
%teens ALL=(ALL:ALL) ALL

The entry above allows teens group (which is untrusted) to execute any commands with sudo. The sysadmin
assumed that teens group knows what they are doing.

Is it true that with above situation, the sysadmins effectively giving the teens group root access? Can it harm the system?

Bagas
 


Hmm... The link above also advocate same setup as above (my question), so let me reiterate: Can adding untrused users and groups to sudoers cause havoc on production system?
 
If in doubt, take them out. Easy to put them back in if su access is frequently required.
 
Last edited by a moderator:
If you've added an untrusted group to the sudoers file -then anybody in that group can issue any command as if they were root.

So yes - members of this group could very easily damage, or completely bork your system.

If they are untrusted - they shouldn't be granted access to sudo at all!
 
If you've added an untrusted group to the sudoers file -then anybody in that group can issue any command as if they were root.

So yes - members of this group could very easily damage, or completely bork your system.

If they are untrusted - they shouldn't be granted access to sudo at all!
Thanks for explanation.
 
Last edited:

Staff online


Top