http://www.linuxplanet.com/linuxplanet/tutorials/7165/1
Best Practices with sudo on LinuxDos and Dont's of sudoSeptember 1, 2010 Best Practices with sudoMany Linux users are familiar with sudo these days. Ubuntu has done a lot to popularize sudo by enforcing its use in place of encouraging users to use su to switch to the root account to install software and perform other administrative tasks. But there's much more to sudo that users and admins should know.What many users aren't aware of is that sudo can be used to execute commands as any user, not just the root user. In the hands of a skilled admin, sudo can be used to set up fine-grained permissions to provide users with access to perform a few administrative tasks without giving away the keys to the kingdom. Let's look at some of the best practices for controlling system access with sudo while still allowing users to be productive. Remember, you must use the visudo command to edit the /etc/sudoers file. It's tempting, and simpler, to give trusted users full access with sudo and allow them to execute any command as any user. Fight that temptation, because you want to limit access to the bare minimum whenever possible.
Where sudo Falls DownYes, sudo is a powerful tool, but it's also complex to configure well and difficult to maintain. When used with a minimal number of systems by experienced admins, it's an adequate method of implementing role based access controls. But for larger shops with dozens of IT staff and tens or hundreds of servers, sudo quickly starts to show its flaws. You can shore up sudo with additional tools. One way is to use a configuration framework like Puppet to manage sudo configurations across multiple systems. This can be particularly effective in shops that are primarily Linux and Unix based, though Puppet's learning curve may be a bit steep.If your organization has deployed Microsoft Active Directory in a mixed network of Linux and Windows servers, you can use Likewise Enterprise to bridge Linux and Unix systems to Active Directory. Not only is it possible to tie Linux and Unix logins to Active Directory credentials, but also to manage sudo configurations for all servers in the network. You can find other tools that help supplement sudo to provide more robust privileged user management. The important thing is to assess your network and decide whether sudo alone is sufficient to handle your needs. For small businesses, sudo is usually just fine -- if you follow best practices and stay on top of the sudo configuration. If sudo isn't managed correctly, it's almost worse than simply sharing root credentials, because it provides a false sense of security. Know how to use sudo and follow these best practices, and then you can relax and enjoy every sandwich. Contributed by Yvo Van Doorn of Likewise Software |