sudo in general, and not requiring password in particular (was Re: trouble adding my user to sudoers list)

techlists at phpcoderusa.com techlists at phpcoderusa.com
Thu Jul 4 15:14:00 MST 2024


Thanks George!!  Lot s to think about.


On 2024-07-04 14:23, George Toft wrote:
> <scroll>
> 
> Regards,
> 
> George Toft
> 
> On 7/4/2024 6:50 AM, techlists at phpcoderusa.com wrote:
>> Thank you so much George!!
>> 
>> Another Question.  I was a police officer in the 80's and 90's. During 
>> my tenure the bank was on the hook for any criminal acts as long as 
>> the customer was not negligent. I only dealt with this on a couple 
>> occasional.
>> 
>> So If someone gets access to my online banking and I report it in a 
>> timely manner, or if someone washes one of my checks and I report it 
>> in a timely manner, is the bank on the hook or am I?
> 
> There are a ton of rules with more acronyms than the IT world has. I 
> would love to tell you what I understand, but I'd be talking out my 
> ass.
> 
> 
>> BTW I thought going old school was the most secure.  I do not trust 
>> the Internet.  My daily driver is a Linux Box and I do not use my 
>> cellular phone for anything except to talk and read some news.  I am 
>> semiretired and have home officed for a long time.
> 
> Not sure there is any magic incantation that I can say that would put 
> you at ease, other than "Risk Analysis," "Government Regulation," 
> "Audit and Reviews," "Compliance," "Controls and Countermeasures," and 
> "Fines." We have to comply with a bazillion rules all designed to 
> protect you, the bank customer. Some regions are really strict and 
> their governments show they really care, like the EU - their rules are 
> so restrictive. Here's an example: You cannot log into a server that 
> serves the EU if Payment Card Information (PCI) is involved with the 
> same user ID that you used to log into your work station. This prevents 
> lateral movement from an insider attack should the attacker get an 
> employee's credentials or Kerberos TGT (Hey!!! It's now on-topic!!!) . 
> This is just an example. We have external inspectors and government 
> auditors on site almost every two weeks making us prove compliance with 
> all the rules, and the bigger we get, the more rules and more 
> regulatory auditors we get to talk to. We actually have two people on 
> my team of 27 whose job used to be project management, now is audit and 
> compliance. All of this to protect you.
> 
> Let's not forget about the Security Operations Center monitoring 
> employee activities. Refer to the GTFOBins email from yesterday. I 
> documented a chained attack to get root based on that page, and the SOC 
> came knocking saying "George, we noticed suspicious activity on this 
> server and this date. Whatcha doin'?" Fortunately, I documented 
> everything and emailed it to my manager, so all I had to do was forward 
> that back to the SOC.
> 
> Mail scares me. I had to send my LEA ID in recently via USPS. I'm 
> hoping they got it.
> 
> 
>> Any suggestions are appreciated.
>> 
>> 
>> 
>> On 2024-07-03 21:48, George Toft wrote:
>>> Sorry, Kieth, I have bad news for you. You took a 30+ year leap 
>>> backwards in security.
>>> 
>>> I can tell you for certain, from my bank fraud analyst friend (just 
>>> got promoted to financial crimes investigator), checks are the second 
>>> most insecure way of transferring money, first being putting the 
>>> money in the envelope. They helped the USPS bust a fraud ring who 
>>> worked in the Post Office - fraudsters were pulling checks out of 
>>> envelopes inside the local Post Office. My friend pulled out all the 
>>> details for the Postmaster General.
>>> 
>>> ACH is free (for you) and secure and guaranteed by the originator as 
>>> they are on the hook to prove the identity of who initiated the 
>>> transaction and they have to pay. It's all very complicated, and I'm 
>>> not going into details here.
>>> 
>>> I use ACH all the time. My physical devices have multi-layer physical 
>>> protection. Logical access control is in-place. Both have 
>>> multi-factor authentication. Password resets require multi-factor 
>>> authentication.
>>> 
>>> And the DoD is worse - their systems have so many layers, it was 
>>> easier to just let my account get deleted from lack of use and 
>>> rebuilt it from scratch. I have notes that tell me screen-by-screen 
>>> what to put in each box and which ones to ignore. It's so secure, 
>>> legitimate users can't even get in... and this is just my health 
>>> insurance.
>>> 
>>> Where all of this can break down - getting on topic - is with the SSH 
>>> protocol and web proxies. When you connect to a website using HTTPS 
>>> using a web proxy, your web browser uses it's cert to set up the 
>>> connection, or so it thinks. What's really happening is the proxy is 
>>> responding to the request and decrypting the message, then it forms a 
>>> new request and sends it to the bank, which believes the proxy and 
>>> sends it back. Everything gets decrypted on the proxy, so whoever has 
>>> admin access to the proxy can see everything. Kinda like opening 
>>> envelopes in the mail room :) Disclaimer: This is what some 
>>> networking guys told me in a presentation about 10 years ago.
>>> 
>>> In summary, ACH is safe if you do it from home without a proxy. Of 
>>> course "safe" is relative, but it's safer than checks in the mail. 
>>> Drop into your bank and ask the branch manager, or call their 
>>> customer service and ask. They won't tell you checks are bad, but 
>>> they will steer you to ACH and tell you it's better. Break out the 
>>> Rosetta Stone and figure out what "better" means in corporate-speak. 
>>> Banks are in it to win it, and they don't offer something for free 
>>> unless they are saving money (cost avoidance) on the alternatives.
>>> 
>>> Regards,
>>> 
>>> George Toft
>>> 
>>> On 7/3/2024 6:21 AM, techlists at phpcoderusa.com wrote:
>>>> <scroll>
>>>> 
>>>> On 2024-07-02 18:20, George Toft via PLUG-discuss wrote:
>>>>> I work for a bank, and you would be amazed at how much security is 
>>>>> baked into the connecting your browser to their web servers. Makes 
>>>>> the NSA look like freshmen. And no, I'm not telling you who I work 
>>>>> for.
>>>>> 
>>>>> Regards,
>>>>> 
>>>>> George Toft
>>>> 
>>>> I'd like to hear more.  The world is a hostile place.  I recently 
>>>> went old school.  I asked the bank to disarm my online banking.  I 
>>>> now deal with paper statements and everything gets paid by check. 
>>>> Not as convenient as on-line banking, however I am hoping it makes 
>>>> my world a little bit more secure.
>>>> 
>>>> What are your thoughts?
>>>> 
>>>> Keith
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>>> 
>>>>> On 6/29/2024 5:19 PM, Keith Smith via PLUG-discuss wrote:
>>>>>> Mike,
>>>>>> 
>>>>>> The world is a hostile place.  The more precautions you take the 
>>>>>> better.  I cover the camera on my cellular phone while not in 
>>>>>> use.  I cover the camera that is built into my laptop while it is 
>>>>>> not in use.  I think on-line banking is dangerous.  At some point 
>>>>>> I want to turn off WIFI and go to wired only on my local net.
>>>>>> 
>>>>>> We lock our cars and houses for a reason.
>>>>>> 
>>>>>> I do not know as much security as I'd like, however it might be 
>>>>>> necessary at some point to to become more cyber.
>>>>>> 
>>>>>> About 24 years ago the members of the Tucson Free Unix Group 
>>>>>> (TFUG) helped me build a server that I ran out of my home.  We 
>>>>>> left the email relay open and I got exploited. About 10 years ago 
>>>>>> I became root and I accidentally overwrote my home directory. 
>>>>>> yikes... both were painful. The first example is a reason we must 
>>>>>> be more aware of what we are doing. The 2nd is an example why we 
>>>>>> should use sudo as much as we can instead of becoming root.
>>>>>> 
>>>>>> Keith
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> On 2024-06-29 08:55, Michael via PLUG-discuss wrote:
>>>>>>> I just realized, while 99% of the people on this list are honest 
>>>>>>> there
>>>>>>> is the diabolical 1%. So I guess I enter my password for the rest 
>>>>>>> of
>>>>>>> my life. Or do you think that it really matters considering this 
>>>>>>> is
>>>>>>> only a mailing list?
>>>>>>> 
>>>>>>> On Sat, Jun 29, 2024, 10:22 AM Michael <bmike1 at gmail.com> wrote:
>>>>>>> 
>>>>>>>> Thanks for saying this. I realized that I only needed to run apt 
>>>>>>>> as
>>>>>>>> root. I didn't know how to make it so I could do that..... but
>>>>>>>> chatgt did!
>>>>>>>> 
>>>>>>>> On Sat, Jun 29, 2024, 5:53 AM Eric Oyen via PLUG-discuss
>>>>>>>> <plug-discuss at lists.phxlinux.org> wrote:
>>>>>>>> 
>>>>>>>>> NO WORRIES FROM THIS END RUSTY.
>>>>>>>>> 
>>>>>>>>> As a general rule, I use sudo only for very specific tasks
>>>>>>>>> (usually updating my development package tree on OS X) and no
>>>>>>>>> where else will I run anything as root. I have seen what 
>>>>>>>>> happens
>>>>>>>>> to linux machines that run infected binaries as root and it can
>>>>>>>>> get ugly pretty fast. In one case, I couldn’t take the machine
>>>>>>>>> out of service because of other items I was involved with, so I
>>>>>>>>> simply made part of the dir tree immutable after replacing a 
>>>>>>>>> few
>>>>>>>>> files in /etc. That would fill up the system logs with an error
>>>>>>>>> message about a specific binary trying to replace a small 
>>>>>>>>> number
>>>>>>>>> of conf files. Once the offending binary was found, it made 
>>>>>>>>> things
>>>>>>>>> easier trying to disable it or get rid of it. However, after a
>>>>>>>>> while, I simply pulled the drive and ran it through a Dod 
>>>>>>>>> secure
>>>>>>>>> erase and installed a newer linux bistro on it. I did use the 
>>>>>>>>> same
>>>>>>>>> trick with chattr to make /bin, /sbin and /etc immutable. That
>>>>>>>>> last turned out to be handy as I caught someone trying to 
>>>>>>>>> rootkit
>>>>>>>>> my machine using a known exploit, only they couldn’t get it to
>>>>>>>>> run because the binaries they wanted to replace couldn’t be
>>>>>>>>> written to. :)Yes, this would be a bit excessive, but over the
>>>>>>>>> long run, proved far less inconvenient than having to wipe and
>>>>>>>>> reinstall an OS.
>>>>>>>>> 
>>>>>>>>> -Eric
>>>>>>>>> From the central Offices of the Technomage Guild, security
>>>>>>>>> Applications Dept.
>>>>>>>>> 
>>>>>>>>>> On Jun 28, 2024, at 6:43 PM, Rusty Carruth via PLUG-discuss
>>>>>>>>> <plug-discuss at lists.phxlinux.org> wrote:
>>>>>>>>>> 
>>>>>>>>>> (Deep breath.  Calm...)
>>>>>>>>>> 
>>>>>>>>>> I can't figure out how to respond rationally to the below, so
>>>>>>>>> all I'm going to say is - before you call troll, you might want
>>>>>>>>> to research the author, and read a bit more carefully what they
>>>>>>>>> wrote.  I don't believe I recommended any of the crazy things 
>>>>>>>>> you
>>>>>>>>> suggest.  And I certainly didn't intend to imply any of that.
>>>>>>>>>> 
>>>>>>>>>> On the other hand, it may not have  been clear, so I'll just 
>>>>>>>>>> say
>>>>>>>>> "Sorry that what I wrote wasn't clear, but english isn't my 
>>>>>>>>> first
>>>>>>>>> language.  Unfortunately its the only one I know".
>>>>>>>>>> 
>>>>>>>>>> And on that note, I'll shut up.
>>>>>>>>>> 
>>>>>>>>>> On 6/26/24 15:05, Ryan Petris wrote:
>>>>>>>>>>> I feel like you're trolling so I'm not going to spend very 
>>>>>>>>>>> much
>>>>>>>>> time on this.
>>>>>>>>>>> 
>>>>>>>>>>> It's been a generally good security practice for at least the
>>>>>>>>> last 25+ years to not regularly run as a privileged user,
>>>>>>>>> requiring some sort of escalation to do administrative-type 
>>>>>>>>> tasks.
>>>>>>>>> By using passwordless sudo, you're taking away that escalation.
>>>>>>>>> Why not just run as root? Then you don't need sudo at all. In
>>>>>>>>> fact, why even have a password at all? Why encrypt? Why don't 
>>>>>>>>> you
>>>>>>>>> just put all your data on a publicly accessible FTP server and
>>>>>>>>> just grab stuff when you need it? The NSA has all your data 
>>>>>>>>> anyway
>>>>>>>>> and you don't have anything to hide so why not just leave it 
>>>>>>>>> out
>>>>>>>>> there for the world to see?
>>>>>>>>>>> 
>>>>>>>>>>> As for something malicious needing to be written to use sudo,
>>>>>>>>> why wouldn't it? sudo is ubiquitous on unix systems; if it 
>>>>>>>>> didn't
>>>>>>>>> at least try then that seams like a pretty dumb malicious 
>>>>>>>>> script
>>>>>>>>> to me.
>>>>>>>>>>> 
>>>>>>>>>>> You also don't necessarily need to open/run something for it 
>>>>>>>>>>> to
>>>>>>>>> run. IIRC there was a recent image vulnerability in Gnome's
>>>>>>>>> tracker-miner application which indexes files in your home
>>>>>>>>> directory. And before you say that wouldn't happen in KDE, it 
>>>>>>>>> too
>>>>>>>>> has a similar program, I believe called Baloo.
>>>>>>>>>>> 
>>>>>>>>>>> There also exists the recent doas program and the systemd
>>>>>>>>> replacement run0 to do the same.
>>>>>>>>>>> 
>>>>>>>>>>> On Wed, Jun 26, 2024, at 12:23 PM, Rusty Carruth via
>>>>>>>>> PLUG-discuss wrote:
>>>>>>>>>>>> Actually, I'd like to start a bit of a discussion on this.
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> First, I know that for some reason RedHat seems to think 
>>>>>>>>>>>> that
>>>>>>>>> sudo is
>>>>>>>>>>>> bad/insecure.
>>>>>>>>>>>> 
>>>>>>>>>>>> I'd like to know the logic there, as I think the argument 
>>>>>>>>>>>> FOR
>>>>>>>>> using sudo
>>>>>>>>>>>> is MUCH stronger than any argument I've heard (which,
>>>>>>>>> admittedly, is
>>>>>>>>>>>> pretty close to zero) AGAINST it.   Here's my thinking:
>>>>>>>>>>>> 
>>>>>>>>>>>> Allowing users to become root via sudo gives you:
>>>>>>>>>>>> 
>>>>>>>>>>>> - VERY fine control over what programs a user can use as 
>>>>>>>>>>>> root
>>>>>>>>>>>> 
>>>>>>>>>>>> - The ability to remove admin privs (ability to run as root)
>>>>>>>>> from an
>>>>>>>>>>>> individual WITHOUT having to change root password 
>>>>>>>>>>>> everywhere.
>>>>>>>>>>>> 
>>>>>>>>>>>> Now, remember, RH is supposedly 'corporate friendly'. As a
>>>>>>>>> corporation,
>>>>>>>>>>>> that 2nd feature is well worth the price of admission, PLUS 
>>>>>>>>>>>> I
>>>>>>>>> can only
>>>>>>>>>>>> allow certain admins to run certain programs? Very nice.
>>>>>>>>>>>> 
>>>>>>>>>>>> So, for example, at my last place I allowed the 'tester' 
>>>>>>>>>>>> user
>>>>>>>>> to run
>>>>>>>>>>>> fdisk as root, because they needed to partition the disk 
>>>>>>>>>>>> under
>>>>>>>>> test.  In
>>>>>>>>>>>> my case, and since the network that we ran on was totally
>>>>>>>>> isolated from
>>>>>>>>>>>> the corporate network, I let fdisk be run without needing a
>>>>>>>>> password.
>>>>>>>>>>>> Oh, and if they messed up and fdisk'ed the boot partition, 
>>>>>>>>>>>> it
>>>>>>>>> was no big
>>>>>>>>>>>> deal - I could recreate the machine from scratch (minus
>>>>>>>>> whatever data
>>>>>>>>>>>> hadn't been copied off yet - which would only be their most
>>>>>>>>> recent run),
>>>>>>>>>>>> in 10 minutes (which was about 2 minutes of my time, and 8
>>>>>>>>> minutes of
>>>>>>>>>>>> scripted 'dd' ;-) However, if the test user wanted to become
>>>>>>>>> root using
>>>>>>>>>>>> su, they had to enter the test user password.
>>>>>>>>>>>> 
>>>>>>>>>>>> So, back to the original question - setting sudo to not
>>>>>>>>> require a
>>>>>>>>>>>> password.  We should have asked, what program do you want to
>>>>>>>>> run as root
>>>>>>>>>>>> without requiring a password? How secure is your system? 
>>>>>>>>>>>> What
>>>>>>>>> else do
>>>>>>>>>>>> you use it for?  Who has access?  etc, etc, etc.
>>>>>>>>>>>> 
>>>>>>>>>>>> There's one other minor objection I have to the 'zero 
>>>>>>>>>>>> defense'
>>>>>>>>> statement
>>>>>>>>>>>> below - the malicious thing you downloaded (and, I assume 
>>>>>>>>>>>> ran)
>>>>>>>>> has to be
>>>>>>>>>>>> written to USE sudo in its attempt to break in, I believe, 
>>>>>>>>>>>> or
>>>>>>>>> it
>>>>>>>>>>>> wouldn't matter HOW open your sudo was. (simply saying 'su -
>>>>>>>>> myscript'
>>>>>>>>>>>> won't do it).
>>>>>>>>>>>> 
>>>>>>>>>>>> And, if you're truly paranoid about stuff you download, you
>>>>>>>>> should:
>>>>>>>>>>>> 
>>>>>>>>>>>> 1 - NEVER download something you don't have an excellent
>>>>>>>>> reason to
>>>>>>>>>>>> believe is 'safe', and ALWAYS make sure you actually
>>>>>>>>> downloaded it from
>>>>>>>>>>>> where you thought you did.
>>>>>>>>>>>> 
>>>>>>>>>>>> 2 - For the TRULY paranoid, have a machine you use to 
>>>>>>>>>>>> download
>>>>>>>>> and test
>>>>>>>>>>>> software on, which you can totally disconnect from your
>>>>>>>>> network (not
>>>>>>>>>>>> JUST the internet), and which has NO confidential info, and
>>>>>>>>> which you
>>>>>>>>>>>> can erase and rebuild without caring.  Run the downloaded
>>>>>>>>> stuff there,
>>>>>>>>>>>> for a long time, until you're pretty sure it won't bite you.
>>>>>>>>>>>> 
>>>>>>>>>>>> 3 - For the REALLY REALLY paranoid, don't download anything
>>>>>>>>> from
>>>>>>>>>>>> anywhere, disconnect from the internet permanently, get
>>>>>>>>> high-tech locks
>>>>>>>>>>>> for your doors, and wrap your house in a faraday cage!
>>>>>>>>>>>> 
>>>>>>>>>>>> And probably don't leave the house....
>>>>>>>>>>>> 
>>>>>>>>>>>> The point of number 3 is that there is always a risk, even
>>>>>>>>> with
>>>>>>>>>>>> 'well-known' software, and as someone else said - they're
>>>>>>>>> watching you
>>>>>>>>>>>> anyway.  The question is how 'safe' do you want to be? And 
>>>>>>>>>>>> how
>>>>>>>>> paranoid
>>>>>>>>>>>> are you, really?
>>>>>>>>>>>> 
>>>>>>>>>>>> Wow, talk about rabbit hole! ;-)
>>>>>>>>>>>> 
>>>>>>>>>>>> 'Let the flames begin!' :-)
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> On 6/25/24 18:50, Ryan Petris via PLUG-discuss wrote:
>>>>>>>>>>>>>> wanted sudo not to require a password.
>>>>>>>>>>>>> Please reconsider this... This is VERY BAD security 
>>>>>>>>>>>>> practice.
>>>>>>>>> There's basically zero defense if you happen to download/run
>>>>>>>>> something malicious.
>>>>>>>>>>>>> 
>>>>>>>>>>>>> On Tue, Jun 25, 2024, at 6:01 PM, Michael via PLUG-discuss
>>>>>>>>> wrote:
>>>>>>>>>>>>>> then I remember that a PLUG member mentioned ChatGPT being
>>>>>>>>> good at troubleshooting so I figured I'd give it a go. I sprint
>>>>>>>>> about half an hour asking it the wrong question but after that 
>>>>>>>>> it
>>>>>>>>> took 2 minutes. I wanted sudo not to require a password. it is
>>>>>>>>> wonderful! now I don't have to bug you guys. so it looks like 
>>>>>>>>> this
>>>>>>>>> is the end of the user group unless you want to talk about OT
>>>>>>>>> stuff.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> -- :-)~MIKE~(-:
>>>>>>>>>>>>>> ---------------------------------------------------
>>>>>>>>>>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>>>>>>>>>>> To subscribe, unsubscribe, or to change your mail 
>>>>>>>>>>>>>> settings:
>>>>>>>>>>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss
>>>>>>>>>>>>>> 
>>>>>>>>>>>>> ---------------------------------------------------
>>>>>>>>>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>>>>>>>>>> To subscribe, unsubscribe, or to change your mail settings:
>>>>>>>>>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss
>>>>>>>>>>>> ---------------------------------------------------
>>>>>>>>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>>>>>>>>> To subscribe, unsubscribe, or to change your mail settings:
>>>>>>>>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss
>>>>>>>>>>>> 
>>>>>>>>>> ---------------------------------------------------
>>>>>>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>>>>>>> To subscribe, unsubscribe, or to change your mail settings:
>>>>>>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss
>>>>>>>>> 
>>>>>>>>> ---------------------------------------------------
>>>>>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>>>>>> To subscribe, unsubscribe, or to change your mail settings:
>>>>>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss
>>>>>>> ---------------------------------------------------
>>>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>>>> To subscribe, unsubscribe, or to change your mail settings:
>>>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss
>>>>>> ---------------------------------------------------
>>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>>> To subscribe, unsubscribe, or to change your mail settings:
>>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss
>>>>> ---------------------------------------------------
>>>>> PLUG-discuss mailing list: PLUG-discuss at lists.phxlinux.org
>>>>> To subscribe, unsubscribe, or to change your mail settings:
>>>>> https://lists.phxlinux.org/mailman/listinfo/plug-discuss


More information about the PLUG-discuss mailing list