Re: nvme as user?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Oct 30, 2023 at 10:13 PM ToddAndMargo via users <users@xxxxxxxxxxxxxxxxxxxxxxx> wrote:
On 10/30/23 03:38, Patrick O'Callaghan wrote:
> On Mon, 2023-10-30 at 00:06 -0400, Jeffrey Walton wrote:
>> On Sun, Oct 29, 2023 at 9:49 PM ToddAndMargo via users
>> <users@xxxxxxxxxxxxxxxxxxxxxxx> wrote:
>>>
>>> On 10/29/23 05:19, Tim via users wrote:
>>>> On Sun, 2023-10-29 at 04:04 -0700, ToddAndMargo via users wrote:
>>>>> I am trying to get around the password issue so I
>>>>> can just do a libnotify popup when I log into my
>>>>> desktop
>>>>
>>>> I recall there's sudo configuration options for users and/or
>>>> particular
>>>> commands that don't require a password.
>>>>
>>>> "To run particular commands without sudo password in Linux, you
>>>> can use
>>>> the NOPASSWD directive in the /etc/sudoers file. This directive
>>>> allows
>>>> you to specify a list of commands that can be run without
>>>> requiring a
>>>> password."
>>>>
>>>> Of course there are risks involved, you'll have decide about that
>>>> for
>>>> yourself.
>>>
>>> Seems like I am going to have to compromise on sudo


Why?  Doas also has settings to allow specific users to run a specific command without password.

>>
>> I believe you can avoid that if you want. Write a C program that
>> calls
>> fork/exec. Call nvme in the fork. Set the setuid bit on the program.
>
> Yes, and open yourself to potential security holes unless you know
> exactly what you're doing (including setting the proper security
> context). Problems with setuid programs written without due care and
> attention are a classic entry point for attack.
>
> Sudo exists to avoid the necessity of this sort of thing.
>
> poc

I finally broke down and used sudo (I despise the fussing
required and the half way documentation)

https://imgur.com/uH74gnT.png
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux