[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Security risks?



Having created a live Debian for a USB stick with 'make-live' using among 
others the '--username  usblive' option I noticed that the USB stick always 
boots into the 'usblive' user account. And any command which require root 
privileges are to be preceded by the 'sudo'.

Questions: 
Is this really a secure setup?
Why doesn't 'sudo' prompt for a root password?
How exactly was it configured so as not to even  prompt for a password for the 
normal user after bootup?
And how exactly was it configured so as not to have a root account? 

Is all the magic done via the /etc/sudoers file only?

J.Neuhoff



Reply to: