Login as root
Why does it rhyme with “shoot yourself in the foot”?
It definitely doesn’t rhyme
Not as robust as far as I can tell. It doesn’t seem to allow for the level of control and logging that sudo does
It’s made for peoples who only has 1 user account on their machine, like 80% of Linux users
I think most of Linux users are server admins
Well it’s not true, most of them use it as a daily os
Source? Most of the internet is powered by Linux
Not every sysadmin use Linux as a daily driver, otherwise there wouldn’t be 4% of Linux users and 96% of linux server
That’s what I’m saying. Most of Linux is servers.
For those like me who didn’t get the joke: Systemd v256 Introduces run0: A Safer Alternative to sudo / linuxiac.com
I don’t know enough about IT security to understand this.
Does that mean that run0 puts programs in some form of sandbox? What’s the difference now to sudo?
Sudo is a setuid binary, which means it executes with root permissions as a child of of the calling process. This technically works, but gives the untrusted process a lot of ways to mess with sudo and potentially exploit it for unauthorized access.
Run0 works by having a system service always running in the background as root. Running a command just sends a message to the already running seevice. This leaves a lot less room for exploits.
Basically the way sudo and doas work is that they turn your current session into a privileged one, then run the command, then put your session back the way it was, this can cause security issues. The way run0 works is that it just asks systemd to do it for you, removing those security risks.
At least thats the way I understand it, im not an expert
Kid is not in sudoers file. This incident will be reported.
Did we ever figure out who it gets reported to?
PowerShell: right clicks and selects run as administrator, loses previous session
sudo git clone
sudo git out of my head
Run0