On 6/6/2011 10:03 AM, Edwin Helbert Aponte Angarita wrote: bin boot dev etc home lib ...
As John said, this doesn't work if I try to issue a sudo in a terminal opened (in the remote machine) before I ssh the remote machine from the local one and issue the sudo command through the ssh link. I had to _open a new_ (gnome) terminal to make this happen.
Again, thanks.
And you must CLOSE/exit the first ssh session in order for the subsequent session to still have sudo rights. As Tejas points out (in another message) you need to snag the tty number. It need not be a gnome terminal, any subsequent ssh connection, or KDE konsole terminal within the timeout will have sudo rights. Ubuntu may not "think" this is a problem because of the way they handle sudo. In ubuntu, you don't give ROOT's password for sudo privileges, you only give your own password, and presumable your actions are limited by the sudo setup. With OpenSUSE, you give Root's password, which seems to make it less useful to use sudo, because of the need to share that password around. If you know that, then you can simply log in as root and game-over! In either case, unless your administrator restricts what can be done with sudo, anyone obtaining login to an sudo enabled account need only do something like sudo -s to obtain a root shell where they can do anything. But with opensuse, at least they need two passwords to do so, unless, that is, they sneak thru using this exploit. -- _____________________________________ ---This space for rent--- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org