But giving blanket root access to any user with sudo is still akin to giving that user full root privileges.
What happens if the bad actor does all of his bad stuff and then issues a:
echo -n | sudo tee /var/log/auth.log
(Note: don't run this command because it will clear out your /var/log/auth.log file)
Then you've lost all of the tracking.
Sorry, it's just going to take a lot more to convince me that sudo is some magical governing system. Linux systems have one root user, period. Well... technically one root uid - 0 - you can have multiple root users sharing the same 0 uid, but doesn't really gain you anything.
Now... if you use sudo to restrict access to certain commands (i.e. not blanket root access) then yes, it can be useful. But again, this is the same concept of building your own application that uses it's own authentication system to validate an individual and then based on that authentication (however you've defined it) then that individual can do certain functions through a login-key based API call. Don't get me wrong, I'm not saying such an application would be fun to write - but that is essentially what a restricted sudo environment is doing.
What happens if the bad actor does all of his bad stuff and then issues a:
echo -n | sudo tee /var/log/auth.log
(Note: don't run this command because it will clear out your /var/log/auth.log file)
Then you've lost all of the tracking.
Sorry, it's just going to take a lot more to convince me that sudo is some magical governing system. Linux systems have one root user, period. Well... technically one root uid - 0 - you can have multiple root users sharing the same 0 uid, but doesn't really gain you anything.
Now... if you use sudo to restrict access to certain commands (i.e. not blanket root access) then yes, it can be useful. But again, this is the same concept of building your own application that uses it's own authentication system to validate an individual and then based on that authentication (however you've defined it) then that individual can do certain functions through a login-key based API call. Don't get me wrong, I'm not saying such an application would be fun to write - but that is essentially what a restricted sudo environment is doing.