this post was submitted on 04 May 2025
291 points (98.0% liked)
linuxmemes
25853 readers
1060 users here now
Hint: :q!
Sister communities:
Community rules (click to expand)
1. Follow the site-wide rules
- Instance-wide TOS: https://legal.lemmy.world/tos/
- Lemmy code of conduct: https://join-lemmy.org/docs/code_of_conduct.html
2. Be civil
3. Post Linux-related content
sudo
in Windows.4. No recent reposts
5. π¬π§ Language/ΡΠ·ΡΠΊ/Sprache
6. (NEW!) Regarding public figures
We all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.Please report posts and comments that break these rules!
Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You can perfectly-reasonably implement suid binaries securely. They need to be simple and carefully constructed, and there shouldn't be many of them, but the assertion that suid is "a security nightmare" is ridiculous.
sudo
itself relies on the suid bit.Yeah, that's the difficult part. It's always better to go with the principle of least privilege (which is Capabilities is trying to do) than to just cross your fingers and hope that there are not bugs in your code. And who exactly is going to police people to make sure that their programs are "simple and carefully constructed"? The article I linked is about a setuid-related vuln in goddamn Xorg which is anything but.
Yes, Xorg being suid is stupid. That used to be needed due to several historical reasons, but is not any more.
But for 'su' or 'sudo' suid is still the right mechanism to use. Capabilities won't help, when the tool is supposed to give one full privileges. Of course, in some use cases no such command is needed, then the system can run with no suid. Similar functionality could be implemented without suid too (e.g. ssh to localhost), but with its own security implications, usually bigger than those brought but a mechanism as simple as suid (the KISS rule).