?
Solved

Adding a user to the root group

Posted on 2003-03-04
6
Medium Priority
?
9,038 Views
Last Modified: 2013-12-04
If I add a particular user to "root" group will that user have root previleges?

If not what are the previleges that user will have?
0
Comment
Question by:prasanna_senanayake
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 2

Accepted Solution

by:
jimbb earned 200 total points
ID: 8069955
No, he won't have root privs; but what privs he _does_ gain are really system dependent.

For instance, some systems will allow you to run 'su' only if you're in group root (they still need to enter the root password), other users are unable to execute the binary.

Most systems seem to just grant you additional read permissions on some files/devices, and in some cases, write permissions.

As always, don't do it unless you really need to.  If you're thinking about doing it then I imagine you have some specific goal in mind?
0
 
LVL 18

Expert Comment

by:liddler
ID: 8071074
To allow a non-root user the ability to run some or all commands that are currently only allowed for root, install and configure sudo for the commands you want.
0
 

Expert Comment

by:DracoX
ID: 8177373
Or if you just wanna be ubercareless, just change their UID to 0
0
 
LVL 1

Expert Comment

by:arhuman
ID: 8209042
If the user is in the group 'root' he will have all accesses granted by GROUP permission in the file system for files owned by the root group:

i.e. he will be able to read a file with those perm

-rw-r----- 1 root root thefile

the important part is the middle of the perms :

r-- for the GROUP

So if you want to see all file accessible in a way by someone in group 'root' :

find / -group root | xargs ls -l

and look at the permissions (group part)

Now to commplete others answers :

On some systems (BSD among others) there is a special 'root/admin'  group  called 'wheel' that you must belong to, before executing some commands like 'su'

The 'sudo' command is indeed, to my mind, the best solution
to allow non root users to execute commands with root rights (just take care to use visudo to configure, instead of editing /etc/sudoers.conf, on most systems it's a common pitfall)
0
 
LVL 18

Expert Comment

by:liddler
ID: 10264127
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

Answered by jimbb

Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

liddler
EE Cleanup Volunteer
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Users of Windows 10 Professional can disable automatic reboots using the policy editor. This tool is not included in the Windows home edition. But don't worry! Follow the instructions below to install (a Win7) policy editor on your Windows 10 Home e…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month13 days, 13 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question