this post was submitted on 23 Mar 2024
102 points (95.5% liked)

Linux

48310 readers
840 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

I see people talking about doas saying it's just like sudo but with less features. I'm just wondering if there is any situation where you should use doas or if it's just personal preference.

you are viewing a single comment's thread
view the rest of the comments
[–] taladar@sh.itjust.works 3 points 8 months ago (1 children)

If it builds a new image that replaces the entire system it could be compromised to give full access to the entire system just as easily as sudo, possibly more easily.

[–] Pantherina@feddit.de 1 points 8 months ago (1 children)

No it just pulls the ostree / OCI image from the fedora image registry and applies changes that need sudo privileges to change, remove etc.

Deploying a different image is not allowed.

See this issue for details

[–] taladar@sh.itjust.works 2 points 8 months ago (1 children)

The component that is like sudo in this case is polkit. Of course an unprivileged user can be used to run sudo commands as well, limited by the rules in the sudo config file, just as these polkit rules limit what the user can do...as long as there is no security issue in sudo and polkit respectively but the actual work is done by a privileged process that is merely controlled by the commands given by the unprivileged user.

[–] Pantherina@feddit.de 1 points 8 months ago

Yes thats the point, the specific actions are a good way to act like a firewall for the access to the privileged process, invoked by anyone.

This is brilliant, as unprivileged users over ssh, or not even logged in, can invoke the updates in that case, making a "grandma pc" that is immutable and autoupdating possible.

See this discussion on how it would eventually be implemented