LWN: Comments on "Fedora 12 to remove unprivileged package installation" https://lwn.net/Articles/362986/ This is a special feed containing comments posted to the individual LWN article titled "Fedora 12 to remove unprivileged package installation". en-us Tue, 07 Oct 2025 12:14:45 +0000 Tue, 07 Oct 2025 12:14:45 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Complexity eats kittens alive!!! https://lwn.net/Articles/363631/ https://lwn.net/Articles/363631/ dskoll <p><i>The distinction between 'device' and 'system-internal device' is clear enough: the latter should really be 'external device'.</i></p> <p>It's not clear to me. What if I have a hot-swappable SCSI disk? Is that internal or external? How about if my root file system is on an external USB device? (Don't laugh... I run my EEEPC that way.)</p> <p>Some of the categories listed don't look useful to me. In fact, they look dangerous exactly because they are imprecise. If complexity is the enemy of security, then imprecision is the nuclear weapon.</p> Tue, 24 Nov 2009 21:10:13 +0000 Complexity eats kittens alive!!! https://lwn.net/Articles/363630/ https://lwn.net/Articles/363630/ nix <div class="FormattedComment"> The distinction between 'device' and 'system-internal device' is clear <br> enough: the latter should really be 'external device'. Basically the <br> latter is internal disks and the former is USB stuff and things like that.<br> <p> What a 'job' is, I have no idea. I agree, there should be a <br> maximally-precise version of the descriptions.<br> <p> </div> Tue, 24 Nov 2009 20:48:49 +0000 sudo granularity https://lwn.net/Articles/363629/ https://lwn.net/Articles/363629/ nix <div class="FormattedComment"> I only discovered it yesterday while exploring libvirt's dependencies <br> (hey, I was bored). It's the first use of even a subset of ML in anger <br> that I've ever seen.<br> <p> </div> Tue, 24 Nov 2009 20:45:16 +0000 Complexity eats kittens alive!!! https://lwn.net/Articles/363574/ https://lwn.net/Articles/363574/ dskoll <p><i>don't you see how that level of granularity might be just a _tad_ welcome to your average admin?</i></p> <p>No, not really. Explain what the difference between "a device" and "a system-internal device" is. What, exactly, are you allowed to do if you are allowed to "Modify a device"? What does "Cancel a job initiated by another user" mean? Kill someone's process? Stop an "at" or "cron" job?</p> <p>We see here creeping Microsoftisms. Vaguely-defined actions (described in dumbed-down, imprecise language) that are supposedly security-critical, so the average admin is completely confused as to what he or she should allow. This is a real step backwards.</p> Tue, 24 Nov 2009 15:53:03 +0000 sudo granularity https://lwn.net/Articles/363550/ https://lwn.net/Articles/363550/ mjthayer <div class="FormattedComment"> Actually after (re-)reading the page linked to above, I wonder whether a good solution would be to write scripts to do this for individual packages using Augeas and try to get them included upstream. The Debian packagers would be likely to use them, but others might well do so as well, and they would get much wider review. And starting with a few high-profile packages might make the idea catch on :)<br> <p> Thanks for pointing out Augeas anyway.<br> </div> Tue, 24 Nov 2009 12:59:16 +0000 sudo granularity https://lwn.net/Articles/363539/ https://lwn.net/Articles/363539/ mjthayer <div class="FormattedComment"> <font class="QuotedText">&gt; Of course, knowing the Debian packaging system there is probably already a way to do this now.</font><br> Update: of course there is.<br> <a href="http://www.debian.org/doc/debian-policy/ap-pkg-conffiles.html">http://www.debian.org/doc/debian-policy/ap-pkg-conffiles....</a><br> </div> Tue, 24 Nov 2009 10:48:15 +0000 sudo granularity https://lwn.net/Articles/363535/ https://lwn.net/Articles/363535/ mjthayer <div class="FormattedComment"> Augeas looks nice, but a relatively mechanism-free way of doing this for .debs (the mechanism used could still be Augeas) would be to add support for configuration file updater scripts. Such a script could process a configuration file automatically and return success if it were able to complete the job without making any "unsafe" changes, and failure with an explanatory message otherwise. All messages from a dpkg configuration run could be displayed at the end of that run to avoid interrupting running updates. And packages like upstart, for which other packages are likely to provide configuration files, could export an updater script for use by those packages.<br> <p> Of course, knowing the Debian packaging system there is probably already a way to do this now.<br> </div> Tue, 24 Nov 2009 10:20:19 +0000 Complexity eats kittens alive!!! https://lwn.net/Articles/363524/ https://lwn.net/Articles/363524/ man_ls Sure, it looks very useful and a real advance over classic Unix permissions. It should be easy to sell to companies. But it is also more complex than classic Unix permissions, so the simpler it is to manage the better. Tue, 24 Nov 2009 07:08:39 +0000 Complexity eats kittens alive!!! https://lwn.net/Articles/363507/ https://lwn.net/Articles/363507/ AdamW <div class="FormattedComment"> it's pretty simple, really.<br> <p> su/sudo: your disk management tool runs as root, or as user. ain't choice great?<br> <p> policykit: administrator can define fine-grained policies for all the following actions:<br> <p> Mount a device<br> Mount a system-internal device<br> Check file system on a device<br> Check file system of a system-internal device<br> Unmount a device mounted by another user<br> List open files<br> List open files on a system-internal device<br> Eject media from a device<br> Detach a drive<br> Modify a device<br> Modify a system-internal device<br> Refresh ATA SMART data<br> Run ATA SMART Self Tests<br> Retrieve historical ATA SMART data<br> Unlock an encrypted device<br> Lock an encrypted device unlocked by another user<br> Configure Linux Software RAID<br> Cancel a job initiated by another user<br> Inhibit media detection<br> Set drive spindown timeout<br> <p> don't you see how that level of granularity might be just a _tad_ welcome to your average admin? Bear in mind that it's relatively simple to set up policies based on several levels of user roles, each level having a particular set of permissions, so you can set up a bunch of tailored profiles for your particular installation, and easily slot new users into the appropriate role for them...<br> </div> Tue, 24 Nov 2009 02:18:20 +0000 sudo granularity https://lwn.net/Articles/363488/ https://lwn.net/Articles/363488/ nix <div class="FormattedComment"> It seems to me that, if it were taught about enough configuration file <br> formats, augeas could fix this (at least for the fairly common case of <br> configuration files that aren't actually programs in a Turing-complete <br> language: nothing will save you from manual resolution if you modify a <br> shell script).<br> </div> Mon, 23 Nov 2009 22:04:35 +0000 sudo granularity https://lwn.net/Articles/363375/ https://lwn.net/Articles/363375/ mjthayer <div class="FormattedComment"> <font class="QuotedText">&gt; Another example is what happens when you perform a upgrade and Debian introduces a configuration change to one of the maintainer scripts?</font><br> Totally off-topic, but that is my least-favourite aspect of the Debian packaging system. The way that configuration files are installed by default, and that if the user then configures the package in any way (including using a script or a GUI tool) they have to manually resolve the differences in the configuration file during upgrade is notably lacking in elegance. I suppose it is hard to avoid in some cases, but I'm sure it could be in most.<br> </div> Mon, 23 Nov 2009 10:33:43 +0000 sudo granularity https://lwn.net/Articles/363374/ https://lwn.net/Articles/363374/ mjthayer <div class="FormattedComment"> <font class="QuotedText">&gt;&gt; So in other words, the difference being that the P*Kits do not give you access to stdin and stdout of the the privileged helper?</font><br> <font class="QuotedText">&gt; You guys are going on like sudo is easy to get right that it's easy to write administrative scripts and that it's configuration system is so much more simpler and easier to deal with.. and it's not.</font><br> Actually I was just wanting to be sure that I had understood your previous posting :) In fact, I really like the idea of PolicyKit, as in properly implementing granular least-privilege administration, and it seams to me as though it could be a more understandable way of doing many things done by SELinux today. My main problem with it is that its dependency on DBus means that it is mainly limited to desktop environments. Nothing against DBus - I think it is a neat IPC system - but it has only really caught on on the desktop, and I'm not really sure why an IPC bus is needed here anyway rather than a privileged helper on the lines of (but not necessarily the same as) sudo. Not to mention that if DBus stops or crashes for any reason - not inconceivable - PolicyKit is also out of action.<br> <p> <p> </div> Mon, 23 Nov 2009 10:17:21 +0000 How many dbus privilege elevation daemons are we going to have? https://lwn.net/Articles/363372/ https://lwn.net/Articles/363372/ buchanmilne <blockquote>Isn't that enough?! Look at the above example given: foo ALL=NOPASSWD: aptitude update, aptitude upgrade </blockquote> I would have thought Debian would have had at least some mitigation for this. Mandriva has had rurpmi for years: <pre> RURPMI.8(1) User Contributed Perl Documentation RURPMI.8(1) NAME rurpmi - restricted urpmi SYNOPSIS rurpmi [options] [package_name...] DESCRIPTION rurpmi is similar to urpmi, but has a stripped-down set of features. It's intended to be used by users without root privileges but with sudo rights on it, preventing any abuse of this tool to compromise the system. With rurpmi, you can't install arbitrary rpm files; moreoever the --keep and --verify-rpm options are forced, and several dangerous options are forbidden (--root, --use-distrib, --env, --allow-nodeps, --allow-force, --force, --noscripts, --auto-update). Also, you won't be able to install rpms with bad signatures. CAVEAT This software is still experimental. While some operations are forbidden, there is no guarantee it is actually secure. OPTIONS The options are the same than urpmi ones. </pre> <p> Note that, being RPM-based, there are no package-installation interactive features in urpmi (diff viewing or editing, prompts for configuring packages after install etc.), although config file diff viewing is available in rpmdrake. <p> While I guess there are potential security risks that haven't been audited, I have been using it via sudo for years (and been providing it to other users, e.g. via sudo rules in LDAP): <p> Now, it won't (in fact, doesn't, as nothing provides access to rurpmi by default) help the GUI case. While rpmdrake run as non-root can browse packages, the default GUI method to install packages ends up running rpmdrake (and thus perl-GTK and GTK etc.) as root. However, packagekit is also available, and will hopefully become the default in future. <p> Ultimately I guess something like *Kit is the solution to manage elevated access, but how many daemons running as root solely to provide privileged access are we going to end up with? So far we have one for packages, one for network interfaces, one for hardware, and one for device permissions. How many more will there be? Mon, 23 Nov 2009 10:11:32 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363323/ https://lwn.net/Articles/363323/ pabs <div class="FormattedComment"> I knew that before my post :)<br> </div> Sun, 22 Nov 2009 11:40:52 +0000 sudo granularity https://lwn.net/Articles/363306/ https://lwn.net/Articles/363306/ hppnq The problems with sudo and dpkg (and friends) you describe have been known for a while. Search for bug 318736: updating the system should not be done by untrusted users, was the verdict of the dpkg maintainer. There are no default configurations that I know that are at odds with this -- except of course the one we are discussing here. <p> (There is cosmic justice: if you have searched for bug 318736, you may have noticed one <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318736">Debian sudo</a> related bug (well, apt-listchanges run with escalated privileges) and one <a href="https://bugs.launchpad.net/ubuntu/+source/smart-notifier/+bug/318736">Ubuntu dbus</a> related one.) Sun, 22 Nov 2009 00:08:41 +0000 Complexity eats kittens alive!!! https://lwn.net/Articles/363302/ https://lwn.net/Articles/363302/ man_ls Complexity is also the enemy of sanity, maintainability and many other things. In general it is the bane of information systems. And here we have some people trying to replace a good old simple well-understood scheme with a complex system having lots of knobs and configuration files. I am not saying that nothing new should ever be tried, but if it is more complex than the original solution then the benefits should be clear and understandable. Otherwise the new scheme almost certainly requires more thought. <p> It seems that most LWN readers don't get the supposed advantages of PolicyKit either. No doubt it is much better than sudo and wheel, but perhaps the real use case (maybe a group of RH clients requesting it) needs a better explanation. Sat, 21 Nov 2009 22:27:49 +0000 sudo granularity https://lwn.net/Articles/363275/ https://lwn.net/Articles/363275/ sbishop <div class="FormattedComment"> I'd go with "fail to install the package". At that point, root needs to get <br> involved, which seems reasonable to me.<br> </div> Sat, 21 Nov 2009 16:00:13 +0000 sudo granularity https://lwn.net/Articles/363273/ https://lwn.net/Articles/363273/ fperrin <blockquote>When you invoke 'aptitude upgrade' aptitude will sometimes run into dependency resolution issues. When that happens you can go into 'resolution mode' that gives you full access to the aptitude gui and there you can perform any of the functions supported by aptitude, which is a huge amount.</blockquote> <p>What happens if the user wants to install a package that conflicts with something that is already installed on the system? Will PackageKit decides to overwrite what is already installed, or will it fail to install the package? The first is a no-no, the second is, well, a failure. Or maybe it will ask the user how to resolve the dependencies, in which case we are back to the same situation as with aptitde in "resolution mode".</p> Sat, 21 Nov 2009 14:52:11 +0000 sudo granularity https://lwn.net/Articles/363268/ https://lwn.net/Articles/363268/ cortana <div class="FormattedComment"> <font class="QuotedText">&gt; How hard would you suppose it would be to get a shell out of something </font><br> <font class="QuotedText">&gt; like that?</font><br> <p> Trivial, FYI. Modify a config file of the one of the packages you are upgrading, and dpkg will ask you whether you want to see a diff, edit the file, or drop to a shell. :)<br> </div> Sat, 21 Nov 2009 13:09:17 +0000 sudo granularity https://lwn.net/Articles/363237/ https://lwn.net/Articles/363237/ drag Isn't that enough?! <br><br> Look at the above example given: <br><br> foo ALL=NOPASSWD: aptitude update, aptitude upgrade <br><br> When you invoke 'aptitude upgrade' aptitude will sometimes run into dependency resolution issues. When that happens you can go into 'resolution mode' that gives you full access to the aptitude gui and there you can perform any of the functions supported by aptitude, which is a huge amount. That is almost certainly not the intended purpose of that sudoers line! How hard would you suppose it would be to get a shell out of something like that? <br><br> Is aptitude even intended to be secure against tempering? Did the author ever intend or expect it to need to be tamper proof? I really doubt it. <br><br> You guys are going on like sudo is easy to get right that it's easy to write administrative scripts and that it's configuration system is so much more simpler and easier to deal with.. and it's not. It's a very difficult thing to get right with a very obscure configuration system and is full of numerous pitfalls and holes. The major benefit of sudo right now is that it's going through so many years of providing so many security holes in so many systems that people have most of the obvious stuff that can go wrong with the sudo command itself fairly locked down. <br><br> Another example is what happens when you perform a upgrade and Debian introduces a configuration change to one of the maintainer scripts? I know you can view the differences between the files... does it use 'less' for this? (I don't know off the top of my head) If it does then you can do a ! and shell out of that and then get full root access. <br><br> In that example it's obvious that the person was trying to take something that was never intended and never designed to provide any sort of security at all.. aptitude was designed for the sole purpose of being used by a root account with no access controls expected at all and then your trying to to use sudo to turn into something that it's not designed to do. I am not trying to pick on it and I expect a person can come up with better examples with more thought, so any apologies if I offended; I am not trying to be insulting or anything here. <br><br> But, at least with packagekit and policykit I never have to worry about any of that affecting the security of my desktops if I configure it to allow certain users to perform upgrades and nothing else. It's not really that difficult to 'get' and work with it to provide that sort of common functionality. not hard to do at all. Sat, 21 Nov 2009 02:36:06 +0000 Policy Kit vs sudo https://lwn.net/Articles/363210/ https://lwn.net/Articles/363210/ dskoll <p><i>However the Dbus IPC is sockets-based. Nothing exotic like a shared memory scheme or anything like that. It gives users root access via those privileged daemons in the a similar manner that having httpd running as root gives remote users root access over port 80. </i></p> <p>Except there are two huge differences: <ul><li>No-one runs httpd as root. It drops privileges immediately after creating the listening socket. <li>The Policy Kit daemon is explicitly designed to run as root and do root-privileged things. That's its whole purpose, after all! </ul> <p>So it's not the case that all the security lies in dbus. The security lies in dbus <em>and</em> the policy kit daemon <em>and</em> in making sure your policies are correctly implemented. It's the last two (especially the last one) that will cause trouble.</p> <p>I'm not convinced that a root-privileged daemon that sanitizes its input is any more or less secure than a SUID binary that sanitizes its environment, etc. It seems to me neither approach is inherently more or less secure.</p> Fri, 20 Nov 2009 22:07:35 +0000 sudo granularity https://lwn.net/Articles/363204/ https://lwn.net/Articles/363204/ mjthayer <div class="FormattedComment"> So in other words, the difference being that the P*Kits do not give you access to stdin and stdout of the the privileged helper?<br> </div> Fri, 20 Nov 2009 21:31:10 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363197/ https://lwn.net/Articles/363197/ drag Yeah. The defaults were not that sensible. Only one user should be administrator and it should of been apparent in the release documentation. <br><br> However the Dbus IPC is sockets-based. Nothing exotic like a shared memory scheme or anything like that. It gives users root access via those privileged daemons in the a similar manner that having httpd running as root gives remote users root access over port 80. <br><br> So ya any security issues in dbus itself or the dbus libraries that applications use would quite easily lead to a compromise and that is something that distros and developers are going to have to be very careful about. As long as that is audited and user supplied input over dbus is carefully managed then it should reduce the attack vector for attackers seeking local root exploits by quite a bit for typical desktop users (vs traditional linux desktop were open sudo and su access are regularly used features) Fri, 20 Nov 2009 21:18:35 +0000 PolicyKit _can_ do this https://lwn.net/Articles/363193/ https://lwn.net/Articles/363193/ tkil <blockquote>I think your question isn't really about sudo per se, but about auth-as-self instead of auth-as-root.</blockquote> <p>Yes, exactly! Thank you for the excellent terminology.</p> <blockquote>And the answer is: yes, PolicyKit can do this. You set ResultAny in the policy config file to "auth_self" instead of "auth_admin" -- or to "auth_self_keep", to provide temporary caching of authorization (like the sudo typical config).</blockquote> <p>That's excellent, and I'll keep it in mind. (I'm currently in the "single user workstation" mode, so having to enter root's password isn't that big of a deal to me, honestly.)</p> <p>If I had more energy, I'd try to follow the conversation on the mailing lists, but I should have taken my cue from the first comment here. :) I do think that the OSX and Vista models of "admin users vs. regular users" is a decent start (and actually echoes historical usage of the "wheel" group); further, I find it preferable to having to enter the root password (the default on Fedora for a while now).</p> <p>(I also realize that there are at least two issues with Linux systems that OSX and Vista don't see nearly as often: (1) the person sitting at the console, regular user or admin, does need extra privs to do some entirely reasonable actions; and (2) Linux systems are far more likely to have remote users than either OSX or Vista systems.)</p> <p>Also also wik, subscriber #18? Yowza. :)</p> Fri, 20 Nov 2009 20:57:00 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363182/ https://lwn.net/Articles/363182/ dskoll <p><i>The use case is "Being able to perform daily desktop activities without granting access to the root account". That's all.</i><p> <p>sudo grants restricted access to the root account. So does Policy Kit. The technical details differ (sudo does it in-process with a SUID binary; Policy Kit does it via IPC to a daemon running as root), but you're just quibbling over semantics by claiming that Policy Kit does not grant "access to the root account."</p> <p>Note that I have no strong preferences for sudo over Policy Kit except for the general observation that very granular and tweakable security facilities are often harder to get right than less granular ones. However, as long as distros do a good job of providing <b>sensible</b> Policy Kit defaults, then Policy Kit is fine. The big issue was that F12's (now reverted) policy was not very sensible.</p> Fri, 20 Nov 2009 19:45:43 +0000 PolicyKit _can_ do this https://lwn.net/Articles/363166/ https://lwn.net/Articles/363166/ mattdm <div class="FormattedComment"> I think your question isn't really about sudo per se, but about auth-as-self instead of auth-as-root. This is often a better choice than no-auth-at-all, particularly for desktop machines -- I want to be able to let my friend browse in Firefox at my computer and be assured that he won't (accidentally or otherwise) install packages, set the system time, etc.<br> <p> And the answer is: yes, PolicyKit can do this. You set ResultAny in the policy config file to "auth_self" instead of "auth_admin" -- or to "auth_self_keep", to provide temporary caching of authorization (like the sudo typical config).<br> <p> consolekit, the tool used in Red Hat derived distributions for root access for GUI (and a few command line) utils before PolicyKit, can also do this.<br> </div> Fri, 20 Nov 2009 18:08:36 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363148/ https://lwn.net/Articles/363148/ drag <i>> Still haven't seen a use case that would have been difficult/impossible to implement with "sudo". Why the wheel reinvention?</i> <br><br> The use case is "Being able to perform daily desktop activities without granting access to the root account". That's all. Like I said people are trying to make this too complicated or something. I don't know. <br><br> The one use case that most people are probably using now and don't give a shit about is the ability to hotplug cameras and USB devices on their desktops. I haven't heard anybody screaming about this for a long time.. not since it was initially introduced and they mistakenly setup the policy for Gnome users to automount any volume and not just removable media. <br><br> That's traditionally root-only action that eliminated a big reason for using sudo on the desktop and increased the usability of the Linux desktop in a huge way. No root password prompt and no user password prompt. This goes for cdroms, usb keys, cameras, and other things. Would it make sense to deny the users this feature if they are not members of wheel and go back to requiring them to use sudo if they were members? <br><br> The ability to perform that action is configurable through policykit and users can decide the automount policy through configuring apps residing entirely in their user account. Administrators can configure all of this through the policykit/sabayon type stuff combined with other *kit things. Fri, 20 Nov 2009 16:47:54 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363145/ https://lwn.net/Articles/363145/ clugstj <div class="FormattedComment"> Still haven't seen a use case that would have been difficult/impossible to implement with "sudo". Why the wheel reinvention?<br> </div> Fri, 20 Nov 2009 16:33:59 +0000 sudo granularity https://lwn.net/Articles/363144/ https://lwn.net/Articles/363144/ stickster <div class="FormattedComment"> Thankfully I'm not involved in the design or implementation of PolicyKit, so any lack of clue I have won't be a factor. :-) Are you interested in reviewing the documentation for PolicyKit and bringing your insight to the development list upstream?<br> </div> Fri, 20 Nov 2009 16:31:15 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363139/ https://lwn.net/Articles/363139/ drag <div class="FormattedComment"> Well if your talking about granting passwordless ability to install packages to all local users then Fedora <br> screwed up on two accounts:<br> <p> 1. Did not put it in the release announcements.<br> <p> 2. Made it default for all local users. It should of only been the default for the initial user.<br> <p> That was the big mistakes.<br> <p> The passwordless stuff is actually a good feature though. Asking for the user's password is just <br> security theater because they have already proven their identity through passwords by being able to <br> log in before. In addition to that prompting users for their user password offers almost no protection <br> against attacker dwelling in their user account. <br> <p> This is a huge misconception that prompting the user for their password multiple times is useful <br> security. It actually is more likely to make things worse since it encourages bad password policy and <br> numbs the user against real security concerns. Prompting them for the root password is counter <br> productive since the whole goal is to eliminate access to root in addition to promoting the same bad <br> password behaviors and encouraging the user to ignore real security concerns.<br> <p> The number #1 threat to Linux desktop security is weak passwords. Requiring the user to use the <br> same passwords multiple times or requiring them to use passwords for regular events is making the <br> problem worse. Regularly popping up warning dialogs is very bad also. Either they have the rights to <br> perform the action or they don't.. bugging them over and over again when they have rights to the <br> action is very 'windows-like' in it's bad behavior.<br> <p> If you still desire a password for regular desktop events then it should probably be a third 'admin' <br> password that is not root and is not the user's password. Even though that is still mostly theater it's <br> probably a good compormize.<br> </div> Fri, 20 Nov 2009 16:24:03 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363140/ https://lwn.net/Articles/363140/ k8to <div class="FormattedComment"> Complexity is the enemy of security.<br> </div> Fri, 20 Nov 2009 16:18:23 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363136/ https://lwn.net/Articles/363136/ clugstj <div class="FormattedComment"> Wow, still trying to justify bad decisions. I haven't seen any use case that couldn't have been much more easily and transparently handled by "sudo". Putting this change in without even having it show up in the release notes deserves all the flaming that has been done - even if it had been a good idea.<br> </div> Fri, 20 Nov 2009 16:08:37 +0000 sudo granularity https://lwn.net/Articles/363131/ https://lwn.net/Articles/363131/ drag If you use Packagekit and Policykit you can configure it to do pretty much the entire thing without allowing the user any access to the root account. <br><br> This is the biggest advantage over sudo. Sudo gives access to the root account and that is a bad thing. Yes it can be configured to do a per binary or even restrict people somewhat on the types of commands they can execute, but the problem you run into is that if there is any vulnerability in any part of that program your handing over or if it's possible to mishandle it in any way then that is a easy way to get root access to your machine. <br><br> With *kit/policykit all you have to worry about in terms of vulnerable code is the dbus interface for the privileged daemon. As long as that is good then you know your safe. Of course you'll never be able to get rid of sudo, it's a very valueable administrative tool, but if you can cover common desktop cases in a more secure manner then that's a big win.<br><br> Fri, 20 Nov 2009 16:04:23 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363128/ https://lwn.net/Articles/363128/ Tara_Li <div class="FormattedComment"> See, silly me, when I saw this feature originally announced, I thought *YAY* - they are now allowing users to install packages into their own home directories! How foolish, though - nobody would care about *THAT* capability.<br> </div> Fri, 20 Nov 2009 15:46:55 +0000 Fedora 12 to remove unprivileged package installation https://lwn.net/Articles/363122/ https://lwn.net/Articles/363122/ drag ><i> And you seriously prefer that over sudo or configuring it properly? Am I missing something?</i> <br><br> I usually prefer to at least try to make something better rather then just shrugging and keeping it insecure because it's easier that way. <br><br> > <i> In the corporate environments where I work security and functionality are not at all tied to the desktop, </i> <br><br> In most places security on desktops is rather important because that is were people get most of their work done and they use desktops to access everything else on the network. This is because they use things like passwords and kerberos tickets as access controls.. if the desktops the people are using is insecure then so is their access to everything else on the network. <br><br> They'll use single sign on and things of that nature because the #1 (by a huge margin) threat to security is weak passwords and requiring users to remember multiple passwords and type in passwords all the time is entirely counter productive. It's absolutely critical that they make it as easy and convenient as possible to use secure passwords. So the place the 'ticket' is cache'd in very important as is the places people type their passwords and access other services from; which of course is the desktop. <br><br> If all the desktop is nothing more then a overgrown a terminal then that's easy... just deny everything to everybody. But that's not the reality of many places. <br><br> None of this is really rocket science and policykit is not the huge bloated monster that people are trying to pretend that it is. Server environments are much simpler and much easier to manage, which is one of the reasons Linux is popular on the servers, but is unpopular on the desktop. "Group Policy" is, indeed, one of the killer features when it comes to something like Active Directory. Policykit can provide one aspect of what people consider 'group policy' and things like Sabayon provide the other half. Fri, 20 Nov 2009 15:14:46 +0000 sudo granularity https://lwn.net/Articles/363121/ https://lwn.net/Articles/363121/ rfunk <div class="FormattedComment"> Any program that would allow the restrictions you're talking about has to be <br> designed for it. How hard is it to design it to take different command-line <br> arguments for the different cases, rather than using some new API?<br> <p> Sigh. Once again, those who don't understand Unix are doomed to re-invent <br> it, poorly.<br> </div> Fri, 20 Nov 2009 14:28:23 +0000 sudo granularity https://lwn.net/Articles/363111/ https://lwn.net/Articles/363111/ hppnq <em><blockquote>Precisely, sudo can only do it when they are different executables.</blockquote></em> <p> Not at all, sudo supports program arguments and options. <p> <em><blockquote>Btw, I am talking about doing it in the graphical interface. Not command line. </blockquote></em> <p> What's the difference? Fri, 20 Nov 2009 14:15:36 +0000 sudo granularity https://lwn.net/Articles/363113/ https://lwn.net/Articles/363113/ fperrin <div class="FormattedComment"> You can also say that user foo can run "aptitude update" and "aptitude upgrade" without password, and bar can run "yum install whatever" with a password with something like:<br> <p> foo ALL=NOPASSWD: aptitude update, aptitude upgrade<br> bar ALL = aptitude<br> # or maybe: bar ALL = aptitude install *<br> <p> <a href="http://www.gratisoft.us/sudo/sample.sudoers">http://www.gratisoft.us/sudo/sample.sudoers</a> contains plenty of other examples. Saying that sudo isn't granular enough is wrong :)<br> <p> </div> Fri, 20 Nov 2009 14:12:14 +0000 sudo granularity https://lwn.net/Articles/363107/ https://lwn.net/Articles/363107/ rahulsundaram <div class="FormattedComment"> Precisely, sudo can only do it when they are different executables. Not granular enough. Btw, I am talking about doing it in the graphical interface. Not command line. <br> </div> Fri, 20 Nov 2009 13:38:46 +0000 sudo granularity https://lwn.net/Articles/363104/ https://lwn.net/Articles/363104/ rfunk <div class="FormattedComment"> sudo can absolutely do that, as long as you have different executables for <br> "updating" and for "just installing" (wrappers are often helpful). I'm not <br> familiar with PackageKit, but I could certainly do it with apt-get or <br> aptitude.<br> </div> Fri, 20 Nov 2009 13:31:37 +0000