1 |
Stroller wrote: |
2 |
> |
3 |
> On 14 Nov 2009, at 20:46, Alan McKinnon wrote: |
4 |
>>> ... |
5 |
>>> You are right of course, but in this particular case the guy who pays |
6 |
>>> wants to have root access. |
7 |
>> |
8 |
>> And you agreed to work like that? |
9 |
>> |
10 |
>> So when he fucks things up good royal and proper, will he gladly |
11 |
>> accept his |
12 |
>> shafting and pay you more to undo it? Or will he do the usual |
13 |
>> customer stunt |
14 |
>> and blame you? |
15 |
> |
16 |
> My typical experience is that the customer will take it completely on |
17 |
> the chin and pay me to fix the problems. That doesn't make foul-ups |
18 |
> due to such unnecessary meddling any less frustrating, though. |
19 |
> |
20 |
>> I only work under one of two conditions: |
21 |
>> |
22 |
>> I am root and the customer is not. |
23 |
>> The customer is root and I am not. |
24 |
> |
25 |
> This is clearly the "right" way to operate, however it can be |
26 |
> extremely difficult to walk away from your largest-paying contract, |
27 |
> just because the owner sees this particular issue differently. |
28 |
> |
29 |
> One has to hope, really, that the client only wants the root password |
30 |
> as insurance in case you get run over by a bus, and won't use it to |
31 |
> arbitrarily mess about on the system. |
32 |
> |
33 |
> Stroller. |
34 |
> |
35 |
> |
36 |
> |
37 |
|
38 |
I would do one thing and take it as often as possible, a large CYA |
39 |
pill. I had this situation with a friend once a few years ago, trust |
40 |
me, it's a lot easier to blame someone else than yourself. System logs |
41 |
saved me since they pointed to him instead of me. |
42 |
|
43 |
That pill should contain logs, notes and anything else that can be used |
44 |
to protect yourself. When a scapegoat is needed, you're it. That said, |
45 |
I sort of think you see this already. |
46 |
|
47 |
Dale |
48 |
|
49 |
:-) :-) |