Debian 6.0
Sponsored Link

Configure sudo
2011/03/05
  Configure sudo to separate users' duty if some people share privileges.

[1] Install sudo
root@dlp:~#
aptitude -y install sudo

[2] rTransfer root privilege to a user all.
root@dlp:~#

# add at the last: user 'squeeze' can use all root privilege

squeeze
ALL=(ALL)
ALL


# how to write ⇒ destination host=(owner) command

# push 'Ctrl + x' key to quit visudo


# make sure with user 'squeeze'

squeeze@dlp:~$
/sbin/shutdown -r now

shutdown: you must be root to do that!
# denied normally

squeeze@dlp:~$
sudo /sbin/shutdown -r now

[sudo] password for squeeze:
# own password


squeeze@dlp:~$
Broadcast message from root@dlp (pts/0) (Sun Mar 6 02:45:10 2011):

The system is going down for reboot NOW!  
# just executed
[2] In addition to the setting [1], set that some commands are not allowed.
root@dlp:~#

# add alias for the kind of shutdown commands

# Cmnd alias specification
Cmnd_Alias SHUTDOWN = /sbin/halt, /sbin/shutdown, \
/sbin/poweroff, /sbin/reboot, /sbin/init


# add ( commands in alias 'SHUTDOWN' are not allowed )

squeeze
ALL=(ALL)
ALL,
!SHUTDOWN


# make sure with user 'squeeze'

squeeze@dlp:~$
sudo /sbin/shutdown -r now

[sudo] password for squeeze:
Sorry, user squeeze is not allowed to execute '/sbin/shutdown -r now' as root on dlp.srv.world.  
# denied
[3] Transfer some commands with root privilege to users in a group.
root@dlp:~#

# add aliase for the kind of user management comamnds

# Cmnd alias specification
Cmnd_Alias USERMGR = /usr/sbin/adduser, /usr/sbin/useradd, /usr/sbin/newusers, \
/usr/sbin/deluser, /usr/sbin/userdel, /usr/sbin/usermod, /usr/bin/passwd


# add at the last

%usermgr ALL=(ALL) USERMGR


root@dlp:~#
groupadd usermgr

root@dlp:~#
vi /etc/group


# add a user in this group

usermgr:x:1002:
squeeze


# make sure with user 'squeeze'

squeeze@dlp:~$
sudo /usr/sbin/useradd testuser

squeeze@dlp:~$
# done normally

squeeze@dlp:~$
sudo /usr/bin/passwd testuser

Enter new UNIX password:
# set testuser's password

Retype new UNIX password:
passwd: password updated successfully
[4] Transfer a command with root privilege to a user.
root@dlp:~#

# add at the last

fedora
ALL=(ALL) /usr/sbin/visudo

cent
ALL=(ALL) /usr/sbin/adduser, /usr/sbin/useradd, /usr/sbin/newusers, \

/usr/sbin/deluser, /usr/sbin/userdel, /usr/sbin/usermod, /usr/bin/passwd

suse
ALL=(ALL) /usr/bin/vim


# make sure with user 'fedora'

fedora@dlp:~$
sudo /usr/sbin/visudo


# possible to open and edit

## Sudoers allows particular users to run various commands as
## the root user, without needing the root password.
##

# make sure with user 'cent'

cent@dlp:~$
sudo /usr/sbin/userdel -r testuser

cent@dlp:~$
# done normally


# make sure with user 'suse'

suse@dlp:~$
sudo /usr/bin/vim /root/.profile


# possible to open and edit

# ~/.profile: executed by Bourne-compatible login shells.
[5] The logs for sudo are kept in '/var/log/secure', but there are many kind of logs in it. So if you'd like to keep only sudo's log in a file, Set like follows.
root@dlp:~#

# add at the last

Defaults syslog=local1


root@dlp:~#
vi /etc/rsyslog.conf


# line 56: add

local1.*
/var/log/sudo.log

auth,authpriv.*
/var/log/auth.log

*.*;auth,authpriv.none
-/var/log/syslog


root@dlp:~#
service rsyslog restart

Stopping enhanced syslogd: rsyslogd.
Starting enhanced syslogd: rsyslogd.
 
Tweet