SELinux vs. sudo and usermode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In many ways, the sudo and usermode programs are kludgy attempts to achieve
what SE Linux does for real -- separate out root powers. Certain users can
be delegated to run only certain programs with root privileges.

Sudo also acts as the sysadmin's swiss army knife. Common practice here is
to have all sysadmins use sudo for _anything_ that needs to be run as root.
This has the advantage of documenting all actions (by agreement, not
enforced, of course), and the convenience of not needing to actually know
the root password.

Likewise, the usermode program allows any user to provide the root password
in order to run the various system-config-* programs. I have a patch (see
<https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=86188>) which allows
members of a given group ("wheel", typically) to authenticate with their
*own* credentials to gain access to these programs. (Other users are
prompted for the root password.)

There's an obvious security tradeoff, here: instead of needing to know two
passwords, one only needs one's own. On the other hand, it removes the need
to manage root passwords for desktop users or for large numbers of machines,
and is an undeniable convenience.

So, since I'm just diving into SE Linux -- how does this _work_ in the Brave
New World?

Is sudo obsolete? Is my usermode patch now pointless? Can this be
accomplished another way? *Should* it be accomplished at all? 

Thanks!


-- 
Matthew Miller           mattdm@xxxxxxxxxx        <http://www.mattdm.org/>
Boston University Linux      ------>                <http://linux.bu.edu/>

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux