<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/tag/sudo">
  <channel>
    <title>sudo</title>
    <link>https://www.linuxjournal.com/tag/sudo</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Four Hidden Costs and Risks of Sudo Can Lead to Cybersecurity Risks and Compliance Problems on Unix and Linux Servers</title>
  <link>https://www.linuxjournal.com/content/four-hidden-costs-and-risks-sudo-can-lead-cybersecurity-risks-and-compliance-problems-unix-a</link>
  <description>  &lt;div data-history-node-id="1339551" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/BT_Logo_md.png" width="800" height="200" alt="Beyond Trust" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/chad-erbe" lang="" about="https://www.linuxjournal.com/users/chad-erbe" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Chad Erbe&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;cite&gt;Sponsored Post:&lt;/cite&gt;
&lt;p&gt;
&lt;/p&gt;
It is always a philosophical debate as to whether to use open source software in a regulated environment. Open source software is crowd sourced, and developers from all over the world contribute to packages that are later included in Operating System distributions. In the case of ‘sudo’, a package designed to provide privileged access included in many Linux distributions, the debate is whether it meets the requirements of an organization, and to what level it can be relied upon to deliver compliance information to auditors. 
&lt;p&gt;
&lt;/p&gt;
There are four hidden costs or risks that must be considered when evaluating whether sudo is meeting your organization’s cybersecurity and compliance needs on its Unix and Linux systems, including administrative, forensics and audit, business continuity, and vendor support. Although sudo is a low-cost solution, it may come at a high price in a security program, and when an organization is delivering compliance data to satisfy auditors. In this article, we will review these areas while identifying key questions that should be answered to measure acceptable levels of risk. While every organization is different, there are specific risk/cost considerations that make a strong argument for replacing sudo with a commercially-supported solution. 
&lt;p&gt;
&lt;/p&gt;
&lt;strong&gt;Administrative Costs&lt;/strong&gt;
&lt;br /&gt; 
There are several hidden administrative costs is using sudo for Unix and Linux privilege management. For example, with sudo, you also need to run a third-party automation management system (like CFEngine or Puppet) plus third party authentication modules on the box. And, if you plan to externalize the box at all, you’re going to have to replace sudo with that supplier’s version of sudo. So, you end up maintaining sudo, a third-party management system, a third-party automation system, and may have to replace it all if you want to authenticate against something external to the box. A commercial solution would help to consolidate this functionality and simplify the overall management of Unix and Linux servers.
&lt;p&gt;
&lt;/p&gt; 
Another complexity with sudo is that everything is local, meaning it can be extremely time-consuming to manage as environments grow. And as we all know, time is money. With sudo, you have to rely on local systems on the server to keep logs locally, rotate them, send them to an archival environment, and ensure that no one is messing with any of the other related subsystems. This can be a complex and time-consuming process. A commercial solution would combine all of this activity together, including binary pushes and retention, upgrades, logs, archival, and more.
&lt;p&gt;
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/four-hidden-costs-and-risks-sudo-can-lead-cybersecurity-risks-and-compliance-problems-unix-a" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 20 Oct 2017 15:19:36 +0000</pubDate>
    <dc:creator>Chad Erbe</dc:creator>
    <guid isPermaLink="false">1339551 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Quick Tip: Setup Ubuntu-style Sudo on other Distributions</title>
  <link>https://www.linuxjournal.com/content/quick-tip-setup-ubuntu-style-sudo-other-distributions</link>
  <description>  &lt;div data-history-node-id="1015135" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/sudo_crop2.png" width="162" height="100" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/michael-reed" lang="" about="https://www.linuxjournal.com/users/michael-reed" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Michael Reed&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;Ubuntu's &lt;a href="http://www.sudo.ws/"&gt;&lt;em&gt;sudo&lt;/em&gt;&lt;/a&gt; command is something that I miss when I'm using other distributions. For the uninitiated, when using Ubuntu, you can execute privileged commands as the root user by prefacing them with &lt;em&gt;sudo&lt;/em&gt;. This saves having to log in as root, do your work and then log out again (or if you're like me, forget to log out and keep doing things as root). Fortunately, it's a cinch to add the functionality to other distributions such as Debian or Fedora.&lt;/p&gt;
&lt;p&gt;Here's a funny thing (well, I found it amusing): If you attempt to execute a command using sudo on, say, stock Debian, before being prompted for your password, you are issued a stern warning:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things:&lt;/p&gt;
&lt;p&gt;#1) Respect the privacy of others.&lt;/p&gt;
&lt;p&gt;#2) Think before you type.&lt;/p&gt;
&lt;p&gt;#3) With great power comes great responsibility.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Once you've got over the lecture and you enter the password, you quickly learn that other distributions don't handle sudo in quite the same way as Ubuntu.&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;[username] is not the in the sudoers file. This incident will be reported.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Eek! The Debian Police didn't actually turn up at my house on this occasion, and although I did notice a helicopter circling above my house for a while, it might have been a coincidence.&lt;/p&gt;
&lt;p&gt;To add Ubuntu-style functionality you need to edit the file &lt;em&gt;/etc/sudoers&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Obviously you can't use sudo yet, so make youtself root by typing&lt;/p&gt;
&lt;pre&gt;su&lt;/pre&gt;&lt;p&gt;Then, use your favorite text editor to open up /etc/sudoers. For example, under Debian type&lt;/p&gt;
&lt;pre&gt;nano /etc/sudoers&lt;/pre&gt;&lt;p&gt;Scroll down until you find the line&lt;/p&gt;
&lt;pre&gt;root ALL=(ALL) ALL&lt;/pre&gt;&lt;p&gt;and underneath, add the line&lt;/p&gt;
&lt;pre&gt;[your username] ALL=(ALL) ALL&lt;/pre&gt;&lt;p&gt;substituting [your username] as appropriate. Save the file and exit the editor. Once you've done this, test things out by executing a command that requires root privileges. Under Debian, I ran:&lt;/p&gt;
&lt;pre&gt;sudo apt-get update&lt;/pre&gt;&lt;p&gt;and sure enough, the command ran with root privileges. As with Ubuntu, it caches your password for a while, so you don't have to keep re-entering it for every command.&lt;/p&gt;
&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/quick-tip-setup-ubuntu-style-sudo-other-distributions" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 22 Oct 2010 15:11:44 +0000</pubDate>
    <dc:creator>Michael Reed</dc:creator>
    <guid isPermaLink="false">1015135 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
