[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: special principals handling
On Feb 1, 2008, at 11:00 , Guillaume Rousse wrote:
> But using a single privilegied entity for a group of people
> requires to
> share secrets (aka root password), which is also a bad idea, and
> doesn't
How is every admin having his/her own $user/admin principal not
traceable?
How is every admin having his/her own $user/admin principal a shared
password?
Additionally, ideally you want a different principal for each *kind*
of administrative action. I have different principals for:
- root
- kerberos admin
- afs admin
- cyrus admin
The big advantage here, aside from limiting the amount of damage a
mistake can cause: should it be necessary to revoke a privilege, it
can be done with minimal disruption to the user and to other admins.
Now, an argument can be made that this leads to multiple e.g. root
passwords (thus, a larger attack surface). Whether this is a
significant issue depends on your threat model.
(Also: giving all privileges to the default principal is like sudo?
Huh? It's like logging in as root / Administrator.)
>
--
brandon s. allbery [solaris,freebsd,perl,pugs,haskell] allbery@kf8nh.com
system administrator [openafs,heimdal,too many hats] allbery@ece.cmu.edu
electrical and computer engineering, carnegie mellon university KF8NH