[8611] in bugtraq

home help back first fref pref prev next nref lref last post

Re: 'sudo' recommendations

daemon@ATHENA.MIT.EDU (Alexey Kuzmichev)
Fri Nov 20 14:30:30 1998

Date: 	Thu, 19 Nov 1998 04:56:21 -0300
Reply-To: Alexey Kuzmichev <alekz@CS.MSU.SU>
From: Alexey Kuzmichev <alekz@CS.MSU.SU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199811190106.RAA25777@passer.osg.gov.bc.ca>

On Wed, 18 Nov 1998, Cy Schubert wrote:

|You can also issue sudo -k to delete the sudo ticket before running
|something potentially dangerous.
|
|The problem you discuss is also an issue with Kerberos.  Any potential
|attacker could use cached Kerberos tickets to gain access to hosts,
|services, or privileges.  To circumvent this, kdestroy your Kerberos
|ticket or log in as a different user.
|

The same problem exists in NIS+ environment. Attacker can get right
credentials by issuing a command under already authenticated UID,
because all credentials (public and decryptded secret keys) are cached
by keyserv daemon and "indexed" by UID. The only way to get rid of
those cached information is to run keylogout command.

home help back first fref pref prev next nref lref last post