And what do you suggest to use otherwise to maintain a server? I am not aware of a solution that would help here? As an attacker you could easily alias any command or even start a modified shell that logs ever keystroke and simulates the default bash/zsh or whatever.
With aliases in the bashrc you can hijack any command and execute instead of the command any arbitrary commands.
So the command can be extracted, as already stated above, this is not a weakness of sudo but a general one.
Simple solution is to not use sudo.
Sorta like Slackware’s default.
Nah just set up PAM to use TOTP or a third party MFA service to send a push to your phone for sudo privs.
…and if you don’t have your phone attached to your hand…?
I…I don’t understand the question.
Also, yubikey or any other token. Plenty of MFA options compatible with sudo.
And what do you suggest to use otherwise to maintain a server? I am not aware of a solution that would help here? As an attacker you could easily alias any command or even start a modified shell that logs ever keystroke and simulates the default bash/zsh or whatever.
$ su -
And how would you not be able to hijack the password when you have control over the user session?
You would have to know the root password.
With aliases in the bashrc you can hijack any command and execute instead of the command any arbitrary commands. So the command can be extracted, as already stated above, this is not a weakness of sudo but a general one.
You would have to KNOW the root password.
No you can alias that command and hijack the password promt via bashrc and then you have the root password as soon as the user enters it.
As root:
Anything else?