Root User Management


 
Thread Tools Search this Thread
The Lounge What is on Your Mind? Root User Management
# 1  
Old 01-06-2006
Question Root User Management

I am currently executing a Unix audit & would like some guidance on best practice for the management of root user access.

The organisation is small, with an IT team of approx 25.
# 2  
Old 01-06-2006
Give the pass only to those who you trust. Logging the root actions that is readable by all users is good too.
# 3  
Old 01-06-2006
I have never seen best practices implemented. But in an ideal world... The root account cannot be used to access the box. You sign on as bob, or george, or whatever. Then you su to root, leaving a audit trail. The exception to this is the system console port...you can log on as root there, reboot the machine, etc. The console port can be accessed only from the computer room. Or, if that is too restrictive, the console port is accessed from a remote console server. You need to signin to the console server as yourself and this leaves an audit trail.

The root password is a strong password. It is available only to a few experts. Can you recover from any disaster? If not, no root password for you. (Possibly a manager has, but does not personally use, the password.) When one of these experts leaves, you disable his or her account. And you change the root password.

Other people use sudo if they need root for something... this also leaves an audit trail. This does not mean ALL in sudoers however. Just a few limited commands.

Something like this is our official policy. But various bigshots often arrange exceptions.
# 4  
Old 01-07-2006
Re: Root User Management.

I just HAD to stick my 2-cents in here. One problem I've seen is a lack of 'terminal servers' with SSH (2) only access. A LOT still use telnet. Telnet and the BSD 'R'-commands should be banned. Another is that nobody sits down with the CEO (president, owner, etc.) and has a discussion about what is the true VALUE of the "stuff" stored on his computer systems. Or the cost to him when these systems are no longer accessible. The goal being to force him/her into a security policy. Which should really limit the "bigshot" access.
The final thing is something an 'old' sysadmin once told me. We were setting root passwords. He grabbed a UNIX book off the shelf, found a chapter or sub-chapter title with six or seven words in it, took the first letter of each word, 'munged' these characters (a=@; l=| e=3, etc.) and stuck the first character of the hostname in front of this string, and the last character of the hostname at the end. He had created 'the same' root password for all machines (easy to remember, especially if you wrote down the chapter title), and at the same time a different root password for EACH machine. I have used this (or a variation) ever since.
# 5  
Old 01-14-2006
root can only access any box through it's console, and only the SA team has root.
Each of our boxes have there own PWD, kinda reassures you on which box our on Smilie
All passwords expire, except for root...which I feel we don't change often enough.

Our shop is a big advocate of sudo.
We have captured menus (that utilize sudo) in place on ALL systems for Datactr personnel for the following actions:
Create unix accounts (IS and User)
Change passwords (all except for root)
Deactivate IS and remove User accounts.

As mentioned before, all of these activities will leave an audit trail...and In our case they will also have an associated HelpDesk request #.
Remember when you had to do all of these tasks...sudo is your friend Smilie

We also utilize email (end-of-day) to help us manage other Audit policies, like the following:
invalid attempts at sudo (not valid sudo user)
invalid attempts at su (not part of SA team)
invalid login attempts 3 or >...these are Hourly.
(This is just an example of what can implemented, this list can go on-and-on)

got SOX? Smilie
In todays SOX climate, I find that all of these policies and associated audit trails are necessary.

If you don't have something similar in place, you may want thinking about how some of them could provide some benefit to your env..
# 6  
Old 01-14-2006
Perderabo,

The job before my current one was the security ideal. Anything that resided in the DMZ or next zone down was Trusted Solaris. The root account was a "role", not a user - thus no direct login from anywhere. RBAC ruled the day and had been extended to provide what sudo could and more. No access that was unencrypted was allowed. All other layers - app, transport, customer and database, thought not TS were setup in a similar fashion. Extensive auditing existed and maintained audit logs local and a a remote location so you could checksum to ensure that the audit trail was unaltered.

Security was tight, but organized well enough to never be an impediment to business.

Cheers,

Keith
# 7  
Old 01-24-2006
My customer (a bank) is happy with the following environment (AIX 5.2):

- root login is disabled
- telnet, ftp and all r-commands are disabled in /etc/inetd.conf
- sudo is used exclusively and based on groups people are allowed to do some tasks which classically are roots tasks (packaging installp-packages i.e.)
- admins (myself included) are allowed a "sudo su -" to become root
- login and file transfer solely via ssh

bakunin
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

How to Switch from Local user to root user from a shell script?

Hi, I need to switch from local user to root user in a shell script. I need to make it automated so that it doesn't prompt for the root password. I heard the su command will do that work but it prompt for the password. and also can someone tell me whether su command spawns a new shell or... (1 Reply)
Discussion started by: Little
1 Replies

2. UNIX for Dummies Questions & Answers

Switching from root to normal user takes me to user's home dir

Whenever i switch from root to another user, by doing su - user, it takes me to home directory of user. This is very annoying as i want to be in same dir to run different commands as root sometimes and sometimes as normal user. How to fix this? (1 Reply)
Discussion started by: syncmaster
1 Replies

3. Shell Programming and Scripting

How to give root access to non root user?

Currently in my system Red Hat is installed. And Many user connect to my machine via SSH Techia Terminal. I want to give some users a root level access. Can anyone please help me how to make it possible. I too searched on the Google but didn't find the correct way Regards ADI (4 Replies)
Discussion started by: adisky123
4 Replies

4. UNIX for Advanced & Expert Users

Root and non-root user not able to delete the file

Hi!! one strange problem occurred with my RHEL 5 box. i'm having logs folder with ownership of non-root user. Created some files with root user under logs folder. here is the scene: -rw-r----- 1 root root 1048227 Feb 28 12:34 SystemOut_13.02.28_12.34.10.log -rw-r----- 1 root root ... (6 Replies)
Discussion started by: sukhdip
6 Replies

5. Shell Programming and Scripting

How to Login as another user through Shell script from current user[Not Root]

Hi Every body, I would need a shell script program to login as different user and perform some copy commands in the script. example: Supppose ora_toms is the active user ora_toms should be able to run a script where user: ftptomsp pass: XXX should login through and run the commands ... (9 Replies)
Discussion started by: ujjwal27
9 Replies

6. UNIX for Dummies Questions & Answers

Sudo to delegate permission from non-root user to another non-root user

I've been through many threads before i decide to create a separate thread. I can't really find the solution to my (simple) problem. Here's what I'm trying to achieve: As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user. The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies

7. Solaris

java version mismatch for normal user and root user

:confused: I installed latest version of java ( jre 1.6) on Solaris Machine ......when I run java -version as root, shows the latest version but when I run java -version as normal user, shows the old / previous version What should I do to fix this ...should show the latest version... (3 Replies)
Discussion started by: frintocf
3 Replies

8. UNIX for Dummies Questions & Answers

How to allow access to some commands having root privleges to be run bu non root user

hi i am new to unix and i have abig task. i have to \run particular commands having root privileges from a non root user. i know sudo is one of the way but i need sum other approach kindly help Thanks (5 Replies)
Discussion started by: suryashikha
5 Replies

9. Shell Programming and Scripting

root user command in shell script execute as normal user

Hi All I have written one shell script for GPRS route add is given below named GPRSRouteSet.sh URL="www.google.com" VBURL="10.5.2.211" echo "Setting route for $URL for GPRS" URL_Address=`nslookup $URL|grep Address:|grep -v "#"|awk -F " " '{print $2}'|head -1` echo "Executing ... (3 Replies)
Discussion started by: mnmonu
3 Replies

10. UNIX for Advanced & Expert Users

Other than root user .Normal user is unable to create files

Hi all, I am using Sun Solaris 9 .In this system normal users unable to create files from the command line.I added these users in bin,adm and even root group i found them unable to create a file. (1 Reply)
Discussion started by: mallesh
1 Replies
Login or Register to Ask a Question