quote:
Originally posted by DC:
It is quite a security risk to su to a normal account as root though, so I wanted it changed.
Why? I do it all the time, although not for the reasons that were used in the FAQ which were the wrong reasons. For instance you may have certain special IDs that you need to run commands under that are normally locked from login access. Like my Amanda backup software runs under the user "operator" and some commands should be run as that user (like erasing tapes, cataloging functions etc). When you su from root to a normal user you are entering a shell with limited privilages, not elevated privilages. I could easily make the case how this is more secure by running commands under another user account that I su'ed to from root rather than running them directly under root.
You can become that user and run the commands under that user easily if you are already root. You don't want to give that user login access and set a password for it because that *will* reduce security. And you certainly don't want to have these processes run under the root ID if you don't have to (especially if they have network daemons which Amanda does).
Another good reason for doing it is if you are trouble-shooting user issues. It is not good security practice to make your users give you their passwords but you can "become" them by su'ing to their ID and trouble-shoot issues that occur under their ID.
But certainly you don't want to use it to get back to your own ID after becoming root with the "su" command, that indeed is... um... I won't say.
[ December 06, 2002: Message edited by: void main ]