Re: DBAs running root.sh

From: Ram Srinivasan <srinivasanram2004_at_gmail.com>
Date: Tue, 4 Feb 2014 09:27:07 -0500
Message-ID: <CAKgSvf9FhxFsS=46emjp-mFfF4zEmrPTSQkdj6dumS3Xep9qew_at_mail.gmail.com>



All:
  This situation occurred exactly 2 years ago at my place. Let me explain this.
  One new SA took over as SA Team Lead, and she wanted to show off her powers. So one day, without telling anyone, she revoked the root access to all the DBAs in one swoop. The next day I was installing some PSU patch, and in order to run the root103.sh, I logged in to root, and it kicked me out. When I asked the SAs, she said that root access has been revoked from the DBAs, and from now on DBAs have to call the SAs to run the root.sh scripts. Usually, running the root.sh script by the SAs at our place takes hours if not days. Without consulting anyone, she took this arbitrary decision. That is it. This infuriated me as the DBA Team Lead.  I complained to the senior management, and after 3-4 meetings and arguments and counter-arguments, it was decided that DBAs will get the "sudo /bin/bash" root priv. Thus the DBAs can sudo /bin/bash and go to root, and run any script they want, and get out.   In my opinion, the DBAs should have access to root, and at the same time DBAs should not misuse this power by changing the kernel parameters, and other system parameters without consulting the SAs.

Thanks

Ram Srinivasan


On Mon, Feb 3, 2014 at 12:08 PM, Austin Hackett <hacketta_57_at_me.com> wrote:

> Hi List
>
> If you work in a security conscious environment, I'd be keen to hear how
> your site handles the root.sh script.
>
> To give you some background:
>
> In my environment, DBAs are currently given direct root access to allow
> them to run root.sh. However, the SA Team would like to tighten this up. If
> giving the DBAs direct root access isn't acceptable (not even temporarily)
> then two options spring to my mind:
>
> 1) SA team run root.sh on behalf of the DBAs. Geography and logistics in
> my organisation are such that having an SA walk over to the DBAs desk is a
> realistic option. Our SAs aren't keen on this approach
> 2) Give DBAs the ability to run root.sh as the root user via sudo. This,
> of course, means that DBAs can run anything they like by editing root.sh,
> so doesn't really help. Understandably our SAs don't like this approach
>
> I am being asked to look into keeping Oracle software version specific
> root.sh scripts in a root-owned location (we are Linux only, so no
> multi-platform concerns). This would allow for secure sudo privileges. We'd
> need these for RDBMS, Grid Infrastructure, and Client.
>
> However, I've explained the scripts are dynamically generated by
> runInstaller and have the Oracle Home path hard-coded into them. We'd need
> a root-owned root.sh for every distinct ORACLE_HOME path we create (some
> hosts have multiple homes, so there's dbhome_1, dbhome_2 etc.). Maybe there
> are other considerations that I'm unaware of - I don't really like to
> second guess what else is going on in the "closed box" of the OUI that
> could be host dependent.
>
> To my mind, taking this non-standard approach is more risky than having
> someone run the script on our behalf, even if it risks introducing delays
> into the build process.
>
> How is this handled in your organisation? Have you ever been asked to have
> a centralised set of root.sh scripts under root control for this reason?
> Have you made it work?
>
> If anyone has some time to share their experiences, it would be much
> appreciated.
>
> Regards
>
> Austin
>
>
>
>
>
>
> --
> http://www.freelists.org/webpage/oracle-l
>
>
>

-- 
Sincerely
Ram Srinivasan

--
http://www.freelists.org/webpage/oracle-l
Received on Tue Feb 04 2014 - 15:27:07 CET

Original text of this message