UnixGuy wrote: » I don't envy you, you're dealing with an idiot (to put it mildly). From the email I could tell that this person is difficult to deal with. Not sure what's wrong with having different file names in a directory... Also, it seems that he doesn't really know to configure proper auditing/logging on his systems and he is blaming it on you guys. Best is to keep quiet with this kind of person, there is no winning. I can't for the life of me figure out what he means by running a shell using sudo? say someone run's a command "sudo ls -l"...ok that's a command that's run on a shell...maybe he 'audits' this shell...and when you run an entire script "sudo ./script.sh" (for example) then that script is run on a different shell...why is that a problem? because he doesn't know how to audit that? Why does he have to show his CIO the logs of a script run? Where I work..every login is logged, and every command run by every user is logged...whether the user is root/sudo.///bla bla...we actually log the user's employee number.....This is how auditing and security is configured...rather than asking users to run the scripts in certain ways or name the files in certain ways lol. I'd try to ignore this guy if I were you...
UnixGuy wrote: » > Why does he have to show his CIO the logs of a script run?
langenoir wrote: » Ok I’ve figured it out. I talked to one of the other Linux guys that I feel somewhat ok with talking to about this, only because of some of the things you already said UnixGuy. Basically people are coping the bash binary and putting it in their home directory. Then they rename it. Then they sudo the new file which I guess opens a new Bash shell, so that they don’t have to run sudo for every command because they’re tired of doing that. They don’t want to have to elevate every command because they think it’s cumbersome. They call it a "root backdoor." The guy I talked to said that doing this keeps them from tracking every single elevated command for auditing later. I don't think the guys are doing it nefariously. Because I work for a big company and they have ridiculous auditing procedures. Supposedly if we fail these audits clients cancel their contracts. This company is probably overly concerned with security. I’m probably not even supposed to share this email, which I’m about to take down the text, but I guess if I felt comfortable talking about it with the guy who wrote it, we probably wouldn’t have had the issue in the first place. I can see why he’s upset, but I’m sure there’s other ways of doing this. I can tell by the way the set up the vSphere, that they’re not as competent as they think they are. Our cloud provider has a whitepaper, detailing exactly how to set up the vSphere, and they still didn’t get it right… Mostly right, but some of the things they missed were kind of a big deal. If it doesn’t involve the vSphere in some way, I generally try to keep my mouth shut. But I thanked him for letting me know and said even though I know I haven’t done this, I’ll keep it in mind for the future. Thanks UnixGuy.
W Stewart wrote: » Have they never heard of sudo su? That switches your user to the root user so you can run commands as root without having to type your password over and over again. I believe sudo -i will do the same thing as well. These guys need to read some man pages.
DoubleNNs wrote: » Doesn't using "sudo su," "sudo -i," or "sudo -s" still allow you to audit in the future?