vsis,
@vsis@feddit.cl avatar

Oh, it’s gonna use polkit. Sudo bloat is a grain of sand compared to polkit.

Why people want to replace sudo with polkit? Visudo is no near as obscure as configuring polkit.

I hope distro maintainers don’t follow this.

john89,

First thing I do with any new desktop installation is disable polkit prompts.

Fuck having to enter my password every time I want to do something.

caseyweederman,

Hey uh can I get your IP address real quick? I have a strong suspicion your philosophy extends to your network ports.

john89, (edited )

You’d be wrong about that.

Edit: he just downvotes me instead of admitting he’s wrong about his assumption, lol.

PseudoSpock,

They can’t help themselves. They gorge themselves on his phallic offerings.

vox,
@vox@sopuli.xyz avatar

I just treat polkit as “set it and forget” kind of thing and leave it on defaults, I’d rather spend my time on something more important

lengau,

…is pkexec not good enough already as a polkit based sudo replacement? Why would one need to systemd-ify that?

vanderbilt,
@vanderbilt@lemmy.world avatar

A lot (and I mean a lot) of criticism can be leveled at systemD. One of the upsides of it becoming popular is the standardization of much of things from the developers’ perspective. It’s easier to target multiple distros when you can rely on systemD’s single implementation of the feature. Over the next decade, I forsee systemD eating more and more of the userspace, until you are only left with managing the differences between DEs and which display server they are using. We’re already headed towards immutable base systems with apps shipping with their own dependencies, which we reduce the differences between distros even further.

baru,

until you are only left with managing the differences between DEs

Maybe they’ll add a DE as well?

Just kidding!

caseyweederman,

systemde

vanderbilt,
@vanderbilt@lemmy.world avatar

Don’t give them ideas 😂

If Canonical and RedHat weren’t backing different horses (Snap vs Flatpak), I could see the app containerization system coming under systemD as well fairly soon. The Cosmic DE project uses functionality from systemD to overlay changes onto the system that are reversible, so that alpha versions of Cosmic can be tested without permanently changing the base system. Imagine apps shipping on whatever container runtime, and dynamically overlaying system-level changes as needed for things that tap into the host system via systemd-sysext.

PseudoSpock,

gross!

TheGrandNagus,

SystemDE

allywilson,

However, distributions like Fedora will definitely be in the lead, judging by previous experiences and stories of adapting new Linux technologies and Systemd components.

I wonder if this is still true, now that he no longer works for RedHat, but Microsoft.

baru,

I wonder if this is still true, now that he no longer works for RedHat, but Microsoft.

Why wouldn’t Fedora do that? Decisions are decided by multiple people, they are not forced through or just decided unilaterally by one person.

Enough people in Fedora try to improve the low level stuff. I’m looking forward to that homedir systemd stuff. Don’t care about this sudo alternative.

jjlinux,

Decisions are decided by multiple people, they are not forced through or just decided unilaterally by one person.

Unless you’re talking about GrapheneOS, but that’s an horror story for another night 🤣

possiblylinux127,

Can’t see how this could go wrong

jeremias,
@jeremias@social.jears.at avatar

So I don’t even use systemd myself I run OpenRC. Yet honestly I find the idea quite intriguing, having the service manager (PID 1) invoke the command seems like a cool idea to me.

It’s not really a sudo alternative as much as it is another way of doing something similar.

pipows,
@pipows@lemmy.today avatar

What you’re refering to as Linux, is in fact, Systemd/Linux, or as I’ve recently taken to calling it, Systemd + Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning Systemd system made useful by the Systemd corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX

PseudoSpock,

Oh it’s no longer POSIX, he’s seen to that!

jaypatelani,
@jaypatelani@lemmy.ml avatar

Thanks to BSDs we have sane alternatives :)

sunbeam60,

🤣

spikederailed,

ProgrammersAreHumanToo, great stuff.

mactan,
nyan,

sudo is already an optional component (yes, really—I don’t have it installed). Don’t want its attack surface? You can stick with su and its attack surface instead. Either is going to be smaller than systemd’s.

systemd’s feature creep is only surpassed by that of emacs.

devfuuu,

And there’s also doas which is a nice substitute.

ichbinjasokreativ,

But systemd is modular. They make an offer and distro maintainers and admins get to choose which parts to use

nyan,

The problem is that those modules are packaged by the developers as opt-out rather than opt-in. It’s a variation on Microsoft’s old embrace-extend-extinguish playbook, only the “extinguish” part hasn’t worked so well because there are some stubborn distros whose needs don’t align with what systemd provides and have maintainers that go out of their way to provide alternatives.

(By contrast, although we may joke about emacs, it’s the myriad of third-party extensions that cause it to just about be its own operating system—it doesn’t all ship with the core.)

Revan343,

systemd’s feature creep is only surpassed by that of emacs.

Tomorrow’s headline: emacs wants to expand to include a Sudo replacement

mfigueiredo,

And after that: emacs wants to include a systemd replacement

:wq

PseudoSpock,

I’d take that over systemd.

devraza,
@devraza@lemmy.ml avatar

Or you can use a doas implementation like OpenDoas, or maybe sudo-rs

pingveno,

Though a Rust clone of sudo that operates in the same way will still have the same problems.

Cysioland,
@Cysioland@lemmygrad.ml avatar

You also won’t be required to use run0.

fruitycoder,

I’m not a fan of having root be able to actually login.

Even more so in a true multiuser env where I would rather have privilege escalation be more granular (certain user/groups can esculate certain actions but not others, maybe even limit options of a cmd).

nyan,

Granted, in a true multiuser environment with an admin who’s carefully tailoring /etc/sudoers to make sure everyone has the least possible privileges that will allow them to still do what they need, sudo is more secure. There’s no doubt of that.

On a machine that has only one human user who’s also the admin, and retains the default sudo-with-user-passwords configuration, su vs sudo is pretty much a wash, security-wise. su requires a second password to get root access, but sudo times out and requires the password to be re-entered while a shell created by su can stay open indefinitely. Which is more easily broken will depend on other details of your situation.

(If you’re running an incorrectly configured ssh server that allows direct root login with only password authentification, having a root password could contribute to problems, but the correct fix there is to reconfigure the ssh server not to do something so stupid. I hope there’s no distro that still ships that way out of the box.)

kbal,
@kbal@fedia.io avatar

Whp is this "Lennart Poettering" character, anyway? I suspect he might be secretly working for Microsoft.

nyan,

It stopped being secret a couple of years ago.

catloaf,

I’m not sure if you’re joking, but yes he does work for Microsoft as of July 2022.

KISSmyOSFeddit,

It’s still missing core functionality for an init system, like a display server protocol, compositor, desktop environment and web browser smh.

smileyhead,

systemd-chromiumd

Cysioland,
@Cysioland@lemmygrad.ml avatar

This but unironically, would be better than Electron (low bar, I know)

baru,

Systemd isn’t just an init system. It is a project with low level building blocks for a distribution. Most of the complaints are that it isn’t just an init system, while it’s not meant to be just an init system.

jkrtn,

If we could get an LLM that uploads all our data along with an ad server in our desktop apps, then we’d really have something going.

SuperSpruce,

I’m no Linux expert, but I’ve never had any problems with sudo, it just works. Shouldn’t systemd have higher priorities on their mind? This feels like change for the sake of change. And if this does happen, I sincerely hope that it just works, like sudo.

Kwdg,

I think the article (or more Lennart Poertting post) explains it quite nicely. The problem with sudo is that the sudo binary itself has the ability to gane elevated privileges which is a potential attack surface

Presi300,
@Presi300@lemmy.world avatar

Don’t we already have polkit and pkexec for that?

mactan,

invoking them is kind of a pain, my sole experience with it was meson/ninja using it but then that default was removed and I’ve never been able to put it back to satisfy my curiosity of how it’s done

Andromxda, (edited )
@Andromxda@lemmy.dbzer0.com avatar

Artix, Devuan, Void, Alpine Linux are the way to go

Also Gentoo and Guix as mentioned in the comments

flakusha, (edited )

Gentoo LET’S GO

Andromxda,
@Andromxda@lemmy.dbzer0.com avatar

You’re absolutely right, I absolutely forgot about Gentoo although it’s my daily driver

kixik,

and Guix

0x2d,

feature creep

onlinepersona,

There’s a rewrite of sudo happening in rust, but he wants to throw out the SUID idea altogether?

when invoked under the “run0” name (via a symlink) it behaves a lot like a sudo clone. But with one key difference: it’s not in fact SUID. Instead it just asks the service manager to invoke a command or shell under the target user’s UID. It allocates a new PTY for that, and then shovels data back and forth from the originating TTY and this PTY.

That sounds like opening up the door to what windows is doing UAC and the wonderful vulnerability that the GOG Launcher had for privilege escalation.

I’m not a security researcher, but giving arbitrary users the ability to tel PID 1 to run a binary of the user’s choosing is… probably not what Pottering is suggesting, but opens up to such vulnerabilities. And if it’s written in C/C++ my trust is further reduced.

Anti Commercial-AI license

ulkesh,

And if it’s written in C/C++ my trust is further reduced.

Do you trust Linux? Because if so, have I got news for you.

shirro,

Wait until they hear the language used to implement OpenBSD. Imagine being one of the authors of seL4 encountering a member of the rust cult.

barsoap,

Giving users access to PID1 running binaries, giving users access to the kernel running binaries as root, I don’t see much difference. SUID was notorious in the past for being leaky, it only ended when distros got serious about fencing use of it in, giving it only to programs actually needing it, making sure that they drop privilege properly, etc.

If anything I’m in the PID1 camp because it’s more microkernely. But in any case broader userspace shouldn’t really care about the mechanism, only have an API to do it and that API being a bit in the file permissions is soooo 1960s.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • Durango
  • magazineikmin
  • mdbf
  • thenastyranch
  • khanakhh
  • rosin
  • Youngstown
  • ethstaker
  • slotface
  • modclub
  • kavyap
  • DreamBathrooms
  • everett
  • ngwrru68w68
  • JUstTest
  • InstantRegret
  • tacticalgear
  • GTA5RPClips
  • cubers
  • normalnudes
  • osvaldo12
  • tester
  • anitta
  • cisconetworking
  • megavids
  • Leos
  • provamag3
  • lostlight
  • All magazines