severity 613533 important
thanks

Raising the severity of this, after it nearly locked me out of a remote
system.  In the process of merging the /etc from an old system into a
new system, and copying around configuration files, I ended up with a
sudoers file with mode 0644, rather than 0440.  As a result, I could no
longer sudo on that system, which meant I couldn't easily fix the
permissions.  Fortunately I had a root password set, and I had stored
the root password in an encrypted file on my personal system, but if I
hadn't I would have lost root access to the system entirely.

I can completely understand sudo refusing to accept sudoers files
writable by non-root.  However, sudo should not object to sudoers files
*readable* by non-root.  This seems like security by obscurity; knowing
what commands users may run does not reduce the security of the system.

- Josh Triplett

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.38-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages sudo depends on:
ii  libc6                         2.11.2-13  Embedded GNU C Library: Shared lib
ii  libpam-modules                1.1.2-2    Pluggable Authentication Modules f
ii  libpam0g                      1.1.2-2    Pluggable Authentication Modules l

sudo recommends no packages.

sudo suggests no packages.

-- Configuration Files:
/etc/sudoers [Errno 13] Permission denied: u'/etc/sudoers'
/etc/sudoers.d/README [Errno 13] Permission denied: u'/etc/sudoers.d/README'

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to