Root access loggin
tevans.uk at googlemail.com
Mon Jul 30 13:44:16 UTC 2007
On Mon, 2007-07-30 at 08:11 -0500, Eric Crist wrote:
> On Jul 30, 2007, at 7:34 AMJul 30, 2007, Adam J Richardson wrote:
> > Tom Evans wrote:
> >> This seems great in principle, but of course, you just gave them a
> >> root
> >> shell, and so they can delete their log file easily enough...
> > You could have cron email it to you every 5 minutes. Unlikely he'd
> > check the crontab immediately, unless he was really bent on the
> > system's destruction. Likely you'd have at least some evidence of
> > his behaviour. Of course your email box would fill up quickly.
> > Adam J Richardson
> If you're really all that worried about this, don't give them root
> access. You could simply sit at the console with them while they
> work. IIRC, they're a contractor, not an employee. Your presence
> during such operations wouldn't be abnormal for a contractor.
> Eric Crist
I'm not at all worried; the OP was. I was merely pointing out that most
auditing solutions have issues that can be worked around by a malicious
user; sometimes you just have to trust someone.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 187 bytes
Desc: This is a digitally signed message part
Url : http://lists.freebsd.org/pipermail/freebsd-questions/attachments/20070730/20037416/attachment.pgp
More information about the freebsd-questions