Sudo Access
The sudoers file can be found at:
Code Block |
---|
/afs/slac/package/taylor/prod/base/sudoers |
The following lines are in the sudoers file:
Code Block |
---|
# NB: The following two aliases define collections of commands for use # by members of the IEPM group on all machines and on the network # trouble-shooting machine, pharlap, respectively. In this context, # "IEPM group" is not necessarily the same as the NIS group named # "iepm"; changes to the commands in the two aliases, or to the users # who should be authorized to use the commands, still need the usual # approvals. # Commands authorized for members of the IEPM group on all machines: Cmnd_Alias IEPM_ALL = NIKHEF_PING,PATHCHAR,PCHAR,PIPECHAR # Commands authorized for members of the IEPM group on pharlap: # The addition of PIPECHAR to this list of commands is granted for # six months only and should be revisted May 28, 2002. Cmnd_Alias IEPM_PHARLAP = SNOOP,TCPDUMP,NDD,PIPECHAR,KILL #the following enables net-eng people to execute the command on #all non-retricted, taylored systems. Cmnd_Alias NET_ENG = NDD_GET,TCPDUMP,ETHTOOL |
The people in the sudoers file with privileges assigned by these two Cmnd_Alias-es are: cal, cottrell, cxg
.
Code Block |
---|
iepm group: cottrell, warrenm, cal, dougc, cxg, grosso Pathchar All sudo /afs/slac/g/scs/bin/pathchar Pchar All sudo /afs/slac/package/netperf/bin/@sys/pchar Pipechar All sudo /afs/slac.stanford.edu/package/netperf/bin/@sys/pipechar NIKHEF ping All sudo /afs/slac/package/nikhef/@sys/ping #Snoop and tcpdump are big security exposures, so please be careful with their use. #Probably a good idea to notify security (email just before you start) if you are #going to use snoop and/or tcpdump Snoop Pharlap sudo snoop Tcpdump Pharlap sudo /afs/slac/package/netperf/bin/@sys/tcpdump u-network-management: warrenm, cottrell, kmartell, cal, cxg, grosso, janewei, gtb ssh All maint-pkg-nikhef: cxg, warrenm, dougc |
The following have /usr/sbin/ndd -set privs and sudo kill (via cmd macro IEPM_PHARLAP) on pharlap (7/19/01):
cal, cottrell, cxg
Account iepm has sudo kill with no password on pharlap (12/14/01)
cottrell also has ndd -set for evagore (11/21/01)
iepm has pipechar with no password on pharlap and antonia (11/28/01)