-----BEGIN PGP SIGNED MESSAGE-----<br>Hash: SHA1<br><br><br><br>On Sat, Nov 8, 2008 at 6:33 PM, N.J. Thomas <<a href="mailto:thomas@zaph.org">thomas@zaph.org</a>> wrote:<br>I've noticed a trend in the past few years where a lot of Unix users (a<br>
group in which I clump BSD, Linux, and Mac OS X) are using passwordless<br>sudo.<br><br>I've always thought this to be a security risk, if a local account with<br>sudo access is compromised then the attackers have root access, so all<br>
my accounts that have blanket sudo access (i.e. "ALL=(ALL) ALL") need to<br>enter a password.<br><br>What is the current thinking/best practice on how to setup sudo on PCs<br>and personal Unix-based desktops? Is passwordless sudo okay in this<br>
context?<br><br>Thomas<br>_______________________________________________<br>talk mailing list<br><a href="mailto:talk@lists.nycbug.org">talk@lists.nycbug.org</a><br><a href="http://lists.nycbug.org/mailman/listinfo/talk">http://lists.nycbug.org/mailman/listinfo/talk</a><br>
<br>I don't want to speak for everyone, but I believe passwordless sudo is<br>always a mistake. If a user needs to run something without tty, for<br>example, its better to correct permissions so that user can run the<br>
process properly. <br><br><br>-----BEGIN PGP SIGNATURE-----<br>Version: GnuPG v1.4.9 (GNU/Linux)<br>Comment: <a href="http://getfiregpg.org">http://getfiregpg.org</a><br><br>iEYEARECAAYFAkkWMuYACgkQUYkOIhDLq7ankACeNcHMEIw6JAcNYuuhVGBFJ46Y<br>
2LgAniPaU56yeJ3zv9Y2/G8trdYwwzvq<br>=eY9N<br>-----END PGP SIGNATURE-----<br><br><br>