Lab Currently Closed Hours: 9am–8pm on Thursday more »

Staff policy



Staff members shall be chosen by the OCF Decision Making Process. [per OCF Board decision on 4/13/89]

[The rest of this policy is per Site Manager decision on 8/30/17]

Background

The OCF Decision Making Process spells out the powers of BoD, the GMs, and the SMs; however, it doesn’t explain what powers other staffers have. The main purpose of this policy is to delineate what things staff can do on their own, what things they must not do, and what things they require special permission from the SM to do.

Authorization

Staff are authorized to act independently of the SMs unless otherwise specified here or elsewhere. This is so staff are not obstructed by having to ask the SMs for approval for all decisions.

Root privileges

The Site Managers have the sole power to add staff to the ocfroot group, otherwise grant root privileges on a machine which runs a production service or which mounts NFS, create and grant privileges to /admin principals, and grant other powers which can be used to gain the aforementioned privileges or access other OCF members’ data.

Staffers in the ocfroot group are known as Technical Managers.

To be eligible for Technical Manager status, you must fulfill the following criteria:

  • A Site Manager must be able to recognize you in person.
  • You must have been a staffer for at least a semester already (although this requirement can be waived at the discretion of an SM).
  • You must demonstrate a concrete, actual need for root privileges (e.g. a command you need to run which is blocking your OCF work).

The Site Managers can revoke Technical Manager status. This can happen, for example, if root privileges aren’t actively being used.

If you are a Technical Manager, use your additional powers wisely. Remember that you must respect the privacy of other members. In particular:

  • Don’t read or modify a member’s files or directories unless one of the following is true:
    • The file or directory’s permissions ordinarily grant you access.
    • The member has requested it (explicitly or implicitly).
    • You have probable cause to suspect that the member may be involved in some policy violation (e.g. a security breach).
  • The above restrictions also apply to surveilling members’ private activity on the OCF (e.g. by strace’ing their processes, recording network packet captures, etc.).
  • If you do have to access a member’s files or other private data, limit your accesses to the minimum required to perform your duties.
  • Let other members know when possible if modifying their files.

Here are some additional guidelines to follow:

  • If you don’t have to use root for something, don’t use it.
  • Avoid running an interactive shell as another user (or else you may cause undesirable side effects like polluting their bash_history or updating their last login time).
  • Avoid using a root shell (i.e. sudo -i).

Abuse of root privileges

The worst thing an OCF staffer could do is abuse root privileges. Abuse of root privileges constitutes anything done using root privileges which is in violation of OCF policies, University policies, or applicable laws. Examples of this are violating members’ privacy (including reading or modifying their files without reasonable cause), harassing members, maliciously logging people out, deliberately compromising OCF security, etc. Abuse of root privileges may result in consequences including, but not limited to, loss of root and/or staff privileges, being banned from the OCF, and/or being referred to the Office of Student Conduct.

Amending of certain policies

There are some policies (e.g. this policy, the Unattended Processes Policy, …) that the Site Managers have the power to amend. The SMs’ power to amend these policies is not delegated to the Deputy Site Managers or any other staffer. In other words, staffers cannot unilaterally make changes to these policies without the SMs’ (or GMs’ or BoD’s) approval.

Site Managers should promptly inform staffers whenever they make amendments to any such policies.