mexicancartel ,

su is the best. I mean, i should be using the admin (root) password for admin things, not the user password of user who is already logged in. And there needs to be a root service already running to make user have root previlages which is dumb imo. Sudo vulnerability could cause previlage escalation but if there is no root process managing this, then it can't leak the root access. Only kernel security issue(or other root processes) will leak root access if that was the case, which i think is better.

steeznson ,

I'm going to continue to keep avoiding Poettering software for as long as he continues to act like a jackass. Even his commit messages are dripping with condescension.

onlooker ,
@onlooker@lemmy.ml avatar

I don't know, we'll just have to see. But personally, I am not a fan of tying so many functionalities to systemd.

Kusimulkku ,

Prompting for every single command seems like it'd suck

ryannathans ,

Systemd, not linux

missingno ,
@missingno@fedia.io avatar

This just sounds like a a solution in search of a problem.

qaz ,

sudo has more than 220k lines of code, I can definitely see the use of a simpler alternative.

UnsavoryMollusk ,

Don't doas already fill that gap ?

LainTrain ,

If you make users sign in too much, they will just make their passwords short and easy to remember, even 24hrs is too much and people bitch about it all the time, especially since we have password managers enforced, meaning every time they need to Auth they need to Auth into their system, Auth into their password manager, copy the password, auth into their phone, look at the 2FA code and type that in.

Doing this every day just to open email is understandably fucking enraging even to me as a security """engineer"""/analyst/${bullshitblueteamemailreaderjob}

Press it harder and they will use simple passwords that will inevitably be passed through to something external (e.g. cockpit which even I can bruteforce) or reused somewhere at some point, and then someone just has to get lucky once and run whatever run0 sudo su <reverse shell bs here> to bypass all protections.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • linux@lemmy.ml
  • test
  • worldmews
  • mews
  • All magazines