how to restrict users not to login to root by using sudo -i and sudo su - and other if exists [duplicate] The 2019 Stack Overflow Developer Survey Results Are In Unicorn Meta Zoo #1: Why another podcast? Announcing the arrival of Valued Associate #679: Cesar Manara 2019 Community Moderator Election ResultsPreventing other users from viewing my filesRestrict certain command optionsHow to restrict some commands for admin in Linux(CentOS)How to add a user to sudoers file?How do I restart apache as non-root (using a git-hook)?Can edit file as root, but not using sudoAllow a user to view the home directory of other users via sudoHow to stop regular users from Switching UsersWhat is the best way to add a user to the sudoer group?Difference between sudo user and root useradding a sudoer in debiansudo does not work with database stored usersDoes sudo restrict on which users can acquire superuser privileges?

How to politely respond to generic emails requesting a PhD/job in my lab? Without wasting too much time

Can each chord in a progression create its own key?

Can the Right Ascension and Argument of Perigee of a spacecraft's orbit keep varying by themselves with time?

Student Loan from years ago pops up and is taking my salary

Do warforged have souls?

My body leaves; my core can stay

"is" operation returns false with ndarray.data attribute, even though two array objects have same id

different output for groups and groups USERNAME after adding a username to a group

How did the audience guess the pentatonic scale in Bobby McFerrin's presentation?

Loose spokes after only a few rides

How do spell lists change if the party levels up without taking a long rest?

Store Dynamic-accessible hidden metadata in a cell

Example of compact Riemannian manifold with only one geodesic.

Does Parliament hold absolute power in the UK?

ELI5: Why do they say that Israel would have been the fourth country to land a spacecraft on the Moon and why do they call it low cost?

Sort list of array linked objects by keys and values

Deal with toxic manager when you can't quit

Am I ethically obligated to go into work on an off day if the reason is sudden?

60's-70's movie: home appliances revolting against the owners

What information about me do stores get via my credit card?

Did the new image of black hole confirm the general theory of relativity?

Drawing vertical/oblique lines in Metrical tree (tikz-qtree, tipa)

Mortgage adviser recommends a longer term than necessary combined with overpayments

Simulating Exploding Dice



how to restrict users not to login to root by using sudo -i and sudo su - and other if exists [duplicate]



The 2019 Stack Overflow Developer Survey Results Are In
Unicorn Meta Zoo #1: Why another podcast?
Announcing the arrival of Valued Associate #679: Cesar Manara
2019 Community Moderator Election ResultsPreventing other users from viewing my filesRestrict certain command optionsHow to restrict some commands for admin in Linux(CentOS)How to add a user to sudoers file?How do I restart apache as non-root (using a git-hook)?Can edit file as root, but not using sudoAllow a user to view the home directory of other users via sudoHow to stop regular users from Switching UsersWhat is the best way to add a user to the sudoer group?Difference between sudo user and root useradding a sudoer in debiansudo does not work with database stored usersDoes sudo restrict on which users can acquire superuser privileges?



.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








3
















This question already has an answer here:



  • Preventing other users from viewing my files [closed]

    3 answers



I have tried to restrict user by editing sudoers file M ALL=!/bin/su. I am able to restrict sudo su - but not sudo -i.










share|improve this question















marked as duplicate by sourcejedi, Jeff Schaller, Rui F Ribeiro, jayhendren, G-Man Jan 24 '18 at 1:01


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.













  • 2





    A few problems with this approach are mentioned here: unix.stackexchange.com/questions/392483/…

    – Guy
    Jan 23 '18 at 11:27











  • If you're trying to ensure a user can't get a root shell, you need to check that every command you allow users to run via sudo doesn't have a way to create a shell. For example, most editors have a shell escape to allow a user to run a shell. You also need to make sure any command you do allow users to run via sudo doesn't have any holes such as using environment variables controlled by the user.

    – Andrew Henle
    Jan 23 '18 at 11:32











  • I want to allow him in all other activities where as he has to run scripts but not to login as root.

    – mmk_ind
    Jan 23 '18 at 11:51






  • 3





    A seasoned user will know how to get around those limitations easily. They are mere annoyances. I would refine better the security model defining wether certain users need or not to have root access.

    – Rui F Ribeiro
    Jan 23 '18 at 11:53












  • Trivial to get around ALL=!/bin/su. See: sudo su ## Permission denied but then ln -s /bin/su /tmp/ouch; sudo /tmp/ouch ## Succeeds

    – roaima
    Jan 23 '18 at 12:02


















3
















This question already has an answer here:



  • Preventing other users from viewing my files [closed]

    3 answers



I have tried to restrict user by editing sudoers file M ALL=!/bin/su. I am able to restrict sudo su - but not sudo -i.










share|improve this question















marked as duplicate by sourcejedi, Jeff Schaller, Rui F Ribeiro, jayhendren, G-Man Jan 24 '18 at 1:01


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.













  • 2





    A few problems with this approach are mentioned here: unix.stackexchange.com/questions/392483/…

    – Guy
    Jan 23 '18 at 11:27











  • If you're trying to ensure a user can't get a root shell, you need to check that every command you allow users to run via sudo doesn't have a way to create a shell. For example, most editors have a shell escape to allow a user to run a shell. You also need to make sure any command you do allow users to run via sudo doesn't have any holes such as using environment variables controlled by the user.

    – Andrew Henle
    Jan 23 '18 at 11:32











  • I want to allow him in all other activities where as he has to run scripts but not to login as root.

    – mmk_ind
    Jan 23 '18 at 11:51






  • 3





    A seasoned user will know how to get around those limitations easily. They are mere annoyances. I would refine better the security model defining wether certain users need or not to have root access.

    – Rui F Ribeiro
    Jan 23 '18 at 11:53












  • Trivial to get around ALL=!/bin/su. See: sudo su ## Permission denied but then ln -s /bin/su /tmp/ouch; sudo /tmp/ouch ## Succeeds

    – roaima
    Jan 23 '18 at 12:02














3












3








3









This question already has an answer here:



  • Preventing other users from viewing my files [closed]

    3 answers



I have tried to restrict user by editing sudoers file M ALL=!/bin/su. I am able to restrict sudo su - but not sudo -i.










share|improve this question

















This question already has an answer here:



  • Preventing other users from viewing my files [closed]

    3 answers



I have tried to restrict user by editing sudoers file M ALL=!/bin/su. I am able to restrict sudo su - but not sudo -i.





This question already has an answer here:



  • Preventing other users from viewing my files [closed]

    3 answers







sudo su not-root-user account-restrictions






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Jan 23 '18 at 11:49









roaima

46.2k758124




46.2k758124










asked Jan 23 '18 at 11:03









mmk_indmmk_ind

1612




1612




marked as duplicate by sourcejedi, Jeff Schaller, Rui F Ribeiro, jayhendren, G-Man Jan 24 '18 at 1:01


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.









marked as duplicate by sourcejedi, Jeff Schaller, Rui F Ribeiro, jayhendren, G-Man Jan 24 '18 at 1:01


This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.









  • 2





    A few problems with this approach are mentioned here: unix.stackexchange.com/questions/392483/…

    – Guy
    Jan 23 '18 at 11:27











  • If you're trying to ensure a user can't get a root shell, you need to check that every command you allow users to run via sudo doesn't have a way to create a shell. For example, most editors have a shell escape to allow a user to run a shell. You also need to make sure any command you do allow users to run via sudo doesn't have any holes such as using environment variables controlled by the user.

    – Andrew Henle
    Jan 23 '18 at 11:32











  • I want to allow him in all other activities where as he has to run scripts but not to login as root.

    – mmk_ind
    Jan 23 '18 at 11:51






  • 3





    A seasoned user will know how to get around those limitations easily. They are mere annoyances. I would refine better the security model defining wether certain users need or not to have root access.

    – Rui F Ribeiro
    Jan 23 '18 at 11:53












  • Trivial to get around ALL=!/bin/su. See: sudo su ## Permission denied but then ln -s /bin/su /tmp/ouch; sudo /tmp/ouch ## Succeeds

    – roaima
    Jan 23 '18 at 12:02













  • 2





    A few problems with this approach are mentioned here: unix.stackexchange.com/questions/392483/…

    – Guy
    Jan 23 '18 at 11:27











  • If you're trying to ensure a user can't get a root shell, you need to check that every command you allow users to run via sudo doesn't have a way to create a shell. For example, most editors have a shell escape to allow a user to run a shell. You also need to make sure any command you do allow users to run via sudo doesn't have any holes such as using environment variables controlled by the user.

    – Andrew Henle
    Jan 23 '18 at 11:32











  • I want to allow him in all other activities where as he has to run scripts but not to login as root.

    – mmk_ind
    Jan 23 '18 at 11:51






  • 3





    A seasoned user will know how to get around those limitations easily. They are mere annoyances. I would refine better the security model defining wether certain users need or not to have root access.

    – Rui F Ribeiro
    Jan 23 '18 at 11:53












  • Trivial to get around ALL=!/bin/su. See: sudo su ## Permission denied but then ln -s /bin/su /tmp/ouch; sudo /tmp/ouch ## Succeeds

    – roaima
    Jan 23 '18 at 12:02








2




2





A few problems with this approach are mentioned here: unix.stackexchange.com/questions/392483/…

– Guy
Jan 23 '18 at 11:27





A few problems with this approach are mentioned here: unix.stackexchange.com/questions/392483/…

– Guy
Jan 23 '18 at 11:27













If you're trying to ensure a user can't get a root shell, you need to check that every command you allow users to run via sudo doesn't have a way to create a shell. For example, most editors have a shell escape to allow a user to run a shell. You also need to make sure any command you do allow users to run via sudo doesn't have any holes such as using environment variables controlled by the user.

– Andrew Henle
Jan 23 '18 at 11:32





If you're trying to ensure a user can't get a root shell, you need to check that every command you allow users to run via sudo doesn't have a way to create a shell. For example, most editors have a shell escape to allow a user to run a shell. You also need to make sure any command you do allow users to run via sudo doesn't have any holes such as using environment variables controlled by the user.

– Andrew Henle
Jan 23 '18 at 11:32













I want to allow him in all other activities where as he has to run scripts but not to login as root.

– mmk_ind
Jan 23 '18 at 11:51





I want to allow him in all other activities where as he has to run scripts but not to login as root.

– mmk_ind
Jan 23 '18 at 11:51




3




3





A seasoned user will know how to get around those limitations easily. They are mere annoyances. I would refine better the security model defining wether certain users need or not to have root access.

– Rui F Ribeiro
Jan 23 '18 at 11:53






A seasoned user will know how to get around those limitations easily. They are mere annoyances. I would refine better the security model defining wether certain users need or not to have root access.

– Rui F Ribeiro
Jan 23 '18 at 11:53














Trivial to get around ALL=!/bin/su. See: sudo su ## Permission denied but then ln -s /bin/su /tmp/ouch; sudo /tmp/ouch ## Succeeds

– roaima
Jan 23 '18 at 12:02






Trivial to get around ALL=!/bin/su. See: sudo su ## Permission denied but then ln -s /bin/su /tmp/ouch; sudo /tmp/ouch ## Succeeds

– roaima
Jan 23 '18 at 12:02











1 Answer
1






active

oldest

votes


















1














For your original question, you will need to exclude /bin/bash (or whatever is defined as the user's shell in /etc/passwd), like so:



tomk ALL= ALL,!/bin/su,!/bin/bash


However(!!!), as stated already in the comments to your question, even though this will deny the user from running sudo -s or sudo -i, it will not really prevent him/her from getting an interactive shell as root.



From man sudoers:




Limitations of the ‘!’ operator



It is generally not effective to “subtract” commands from ALL using the ‘!’ operator. A user can trivially circumvent this by copying the desired command to a different name and then executing that.
For example:



bill ALL = ALL, !SU, !SHELLS


Doesn't really prevent bill from running the commands listed in SU or SHELLS since he can simply copy those commands to a different name, or use a shell escape from an editor or other program. There‐
fore, these kind of restrictions should be considered advisory at best (and reinforced by policy).



In general, if a user has sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell (or making their own copy of a shell) regardless of any ‘!’ elements in
the user specification.







share|improve this answer





























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    1














    For your original question, you will need to exclude /bin/bash (or whatever is defined as the user's shell in /etc/passwd), like so:



    tomk ALL= ALL,!/bin/su,!/bin/bash


    However(!!!), as stated already in the comments to your question, even though this will deny the user from running sudo -s or sudo -i, it will not really prevent him/her from getting an interactive shell as root.



    From man sudoers:




    Limitations of the ‘!’ operator



    It is generally not effective to “subtract” commands from ALL using the ‘!’ operator. A user can trivially circumvent this by copying the desired command to a different name and then executing that.
    For example:



    bill ALL = ALL, !SU, !SHELLS


    Doesn't really prevent bill from running the commands listed in SU or SHELLS since he can simply copy those commands to a different name, or use a shell escape from an editor or other program. There‐
    fore, these kind of restrictions should be considered advisory at best (and reinforced by policy).



    In general, if a user has sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell (or making their own copy of a shell) regardless of any ‘!’ elements in
    the user specification.







    share|improve this answer



























      1














      For your original question, you will need to exclude /bin/bash (or whatever is defined as the user's shell in /etc/passwd), like so:



      tomk ALL= ALL,!/bin/su,!/bin/bash


      However(!!!), as stated already in the comments to your question, even though this will deny the user from running sudo -s or sudo -i, it will not really prevent him/her from getting an interactive shell as root.



      From man sudoers:




      Limitations of the ‘!’ operator



      It is generally not effective to “subtract” commands from ALL using the ‘!’ operator. A user can trivially circumvent this by copying the desired command to a different name and then executing that.
      For example:



      bill ALL = ALL, !SU, !SHELLS


      Doesn't really prevent bill from running the commands listed in SU or SHELLS since he can simply copy those commands to a different name, or use a shell escape from an editor or other program. There‐
      fore, these kind of restrictions should be considered advisory at best (and reinforced by policy).



      In general, if a user has sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell (or making their own copy of a shell) regardless of any ‘!’ elements in
      the user specification.







      share|improve this answer

























        1












        1








        1







        For your original question, you will need to exclude /bin/bash (or whatever is defined as the user's shell in /etc/passwd), like so:



        tomk ALL= ALL,!/bin/su,!/bin/bash


        However(!!!), as stated already in the comments to your question, even though this will deny the user from running sudo -s or sudo -i, it will not really prevent him/her from getting an interactive shell as root.



        From man sudoers:




        Limitations of the ‘!’ operator



        It is generally not effective to “subtract” commands from ALL using the ‘!’ operator. A user can trivially circumvent this by copying the desired command to a different name and then executing that.
        For example:



        bill ALL = ALL, !SU, !SHELLS


        Doesn't really prevent bill from running the commands listed in SU or SHELLS since he can simply copy those commands to a different name, or use a shell escape from an editor or other program. There‐
        fore, these kind of restrictions should be considered advisory at best (and reinforced by policy).



        In general, if a user has sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell (or making their own copy of a shell) regardless of any ‘!’ elements in
        the user specification.







        share|improve this answer













        For your original question, you will need to exclude /bin/bash (or whatever is defined as the user's shell in /etc/passwd), like so:



        tomk ALL= ALL,!/bin/su,!/bin/bash


        However(!!!), as stated already in the comments to your question, even though this will deny the user from running sudo -s or sudo -i, it will not really prevent him/her from getting an interactive shell as root.



        From man sudoers:




        Limitations of the ‘!’ operator



        It is generally not effective to “subtract” commands from ALL using the ‘!’ operator. A user can trivially circumvent this by copying the desired command to a different name and then executing that.
        For example:



        bill ALL = ALL, !SU, !SHELLS


        Doesn't really prevent bill from running the commands listed in SU or SHELLS since he can simply copy those commands to a different name, or use a shell escape from an editor or other program. There‐
        fore, these kind of restrictions should be considered advisory at best (and reinforced by policy).



        In general, if a user has sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell (or making their own copy of a shell) regardless of any ‘!’ elements in
        the user specification.








        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Jan 23 '18 at 13:11









        Tom KlinoTom Klino

        410719




        410719













            -account-restrictions, not-root-user, su, sudo

            Popular posts from this blog

            Mobil Contents History Mobil brands Former Mobil brands Lukoil transaction Mobil UK Mobil Australia Mobil New Zealand Mobil Greece Mobil in Japan Mobil in Canada Mobil Egypt See also References External links Navigation menuwww.mobil.com"Mobil Corporation"the original"Our Houston campus""Business & Finance: Socony-Vacuum Corp.""Popular Mechanics""Lubrite Technologies""Exxon Mobil campus 'clearly happening'""Toledo Blade - Google News Archive Search""The Lion and the Moose - How 2 Executives Pulled off the Biggest Merger Ever""ExxonMobil Press Release""Lubricants""Archived copy"the original"Mobil 1™ and Mobil Super™ motor oil and synthetic motor oil - Mobil™ Motor Oils""Mobil Delvac""Mobil Industrial website""The State of Competition in Gasoline Marketing: The Effects of Refiner Operations at Retail""Mobil Travel Guide to become Forbes Travel Guide""Hotel Rankings: Forbes Merges with Mobil"the original"Jamieson oil industry history""Mobil news""Caltex pumps for control""Watchdog blocks Caltex bid""Exxon Mobil sells service station network""Mobil Oil New Zealand Limited is New Zealand's oldest oil company, with predecessor companies having first established a presence in the country in 1896""ExxonMobil subsidiaries have a business history in New Zealand stretching back more than 120 years. We are involved in petroleum refining and distribution and the marketing of fuels, lubricants and chemical products""Archived copy"the original"Exxon Mobil to Sell Its Japanese Arm for $3.9 Billion""Gas station merger will end Esso and Mobil's long run in Japan""Esso moves to affiliate itself with PC Optimum, no longer Aeroplan, in loyalty point switch""Mobil brand of gas stations to launch in Canada after deal for 213 Loblaws-owned locations""Mobil Nears Completion of Rebranding 200 Loblaw Gas Stations""Learn about ExxonMobil's operations in Egypt""Petrol and Diesel Service Stations in Egypt - Mobil"Official websiteExxon Mobil corporate websiteMobil Industrial official websiteeeeeeeeDA04275022275790-40000 0001 0860 5061n82045453134887257134887257

            Frič See also Navigation menuinternal link

            Identify plant with long narrow paired leaves and reddish stems Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?What is this plant with long sharp leaves? Is it a weed?What is this 3ft high, stalky plant, with mid sized narrow leaves?What is this young shrub with opposite ovate, crenate leaves and reddish stems?What is this plant with large broad serrated leaves?Identify this upright branching weed with long leaves and reddish stemsPlease help me identify this bulbous plant with long, broad leaves and white flowersWhat is this small annual with narrow gray/green leaves and rust colored daisy-type flowers?What is this chilli plant?Does anyone know what type of chilli plant this is?Help identify this plant