-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
create user admin
by default and add user admin
to group sudo
by default
#9519
Comments
This isn't "root cannot open", it's "any user other than And also, if you remove For more in-depth analysis see #2695 (comment) A more practical approach is #9512 (or rather #2695 as a more specialized mechanism) and use |
Right. So all of these services X11 (or Wayland in the future), dbus, xdg-portals should be duplicated under a different user name (in this case "
Right.
I have been reading that and other comments many times with great interest and I think all of these points can be addressed. For example, quote:
In response, SUID Disabler and Permission Hardener has been implemented.
Right. That's why ideally in the future, at least security conscious users, will avoid user
I've researched and documented Strong Linux User Account Isolation in detail. If user It's doable. Other (unfortunately less user-freedom motivated) operating systems such as Android, iOS managed to implement a pretty solid Administrative Rights Refusal (non-root enforcement). Strong user/admin separation can be implemented in Freedom Software Linux distributions too, while still allowing secure admin/sudo access (user freedom).
Right. (For now, when using (In Kicksecure documentation, using
|
The problem you're addressing (if any)
When removing the
qubes-core-agent-passwordless-root
package (to develop towards strong root/user isolation), the suggested way to gain administrative rights in Qubes is to run in dom0 something likeqvm-run -u root vmname xfce4-terminal
. This is problematic.Why not use
root
?root
cannot open graphical applications such as graphical text editors (for configuration file editing).** Maybe X11 can be hacked with a ton of environment variables to workaround this. Maybe even Wayland. But it's non-standard and an uphill battle.
** Some applications such as
kate
have even hardcoded (non-configurable) code to outright refuse running as root.root
does not have a persistent bash command history because its/root/.histfile
is stored in Qubes root image.** As a result, lengthy commands such as
http_proxy=http://127.0.0.1:8082 https_proxy=http://127.0.0.1:8082 flatpak update
are lost from the history and need to be re-typed (or copied from somewhere) every time.root
has no bash completion by default, which requires even more typing.sudo
access.sudo
to have an audit trail.The solution you'd like
Create user
admin
by default and add useradmin
to groupsudo
by default.The value to a user, and who that user might be
Fixes all issues mentioned above under "Why not use
root
?"Completion criteria checklist
The text was updated successfully, but these errors were encountered: