56 points

This will probably lead to vocal outrage because it’s Systemd rather than an alternative project coming up with the solution.

Sudo has long known to have dangerous weaknesses, but it’s generally been accepted since sudo solves a bunch of other problems. If we can fix the problems sudo has, then that’s a good thing. Would be nicer if we could split up some of these projects though to stop uber projects.

permalink
report
reply

The outrage is that the solution is to suck the feature into an already massive project built to replace initd and has absorbed several other services (syslog, logind, crond), creating dependencies along the way.

systemd will be superceded, like pulseaudio, because it has an awful design. It’ll just be a lot more work for distros to replace because of all the other services it’s absorbed. Hopefully by then Poettering will have retired and stopped inflicting his software in people. The problem isn’t his initial offerings; those are rather good and solve a problem well. Good enough that distros adopt it. It’s just that he can’t resist feature envy and bloat, and once a distro has a dependency on his solution, the bloat comes along and it’s more work to switch away than just let the bloat take over.

Edit: “superseded?” Where were you when I needed you, autocorrect?

permalink
report
parent
reply
22 points

The reason systemd absorbs other services is because it’s trying to make a proper integrated OS userland. Having a load of separate components that don’t really know anything about each other kiiind of works, but it’s super janky.

For example Windows has supported a secure attention key sequence (ctrl-alt-del) for literal decades. Linux still doesn’t support this very basic - and critical for shared computing environments like schools - feature, because it requires coordinating X11 and logind and the kernel and god knows what else and they simply aren’t properly integrated.

The systemd hatred strongly reminds me of when Xorg started automating the config and you no longer needed xfree86config. You didn’t need to manually write mode lines and tell X that your mouse had 3 buttons, and some people did not like that.

Yes it sounds completely insane that people wouldn’t like this obvious improvement where things used to require tedious manual configuration and now they worked automatically but some people really didn’t I promise! My theory is that it’s because a) it made their hard won knowledge obsolete, making them less smart relatively, and b) they resented the fact that they had to go through the pain but new people wouldn’t and that isn’t fair.

Seems similar with systemd. I would like my laptop to sleep properly please.

Also I have actually read some of the sudo source code. There’s absolutely no way that code should be SUID. Insane.

permalink
report
parent
reply
12 points

systemd will be superseded

wake me up when this happen lol

permalink
report
parent
reply

A few years ago, you’d have said the same thing about pulseaudio.

permalink
report
parent
reply
7 points
*

Yep, completely agree. That was essentially the last line of my comment.

I also wish that journald had a spec for its database, or standardised on something like Sqlite which could be interrogated with generic tooling.

permalink
report
parent
reply

Agree, and I think I understood what you meant.

I can see an argument that Poettering is a net good because he does something, and it’s usually pretty decent to start. Then after it’s been widely adopted, some weird software megalomania takes over and it swells into a bloated carcass until someone is motivated enough to build a better, more focused, replacement.

systemd is a distro builder’s dream: all you need is that and a kernel, and you’ve got most of the non-userspace, so you throw GNU on top and you’re free to do what you really wanted to focus on: a new package manager, or a specific desktop environment, bells-and-whistles.

I really hate journald. Like, with enough passion I’m slowly converting all my systems away from systemd, just to get rid of it. It’s slow and buggy, and the fact that I can’t swap it out for something else is the reason I’m anti-systemd. Which is an excellent initd replacement, IMO, and if that were all it was I’d be a fan-boi. But journald stinks, for all the reasons you point out, and more.

permalink
report
parent
reply
2 points

Hopefully by then Poettering will have retired and stopped inflicting his software in people.

How did he get so much influence over most mainstream distros? Asking for a friend…

permalink
report
parent
reply
6 points

he never, distros adopted systemd because it works, no one forced them, end of the history

permalink
report
parent
reply

Because the software he writes starts out good, and solves problems. systemd is a really nice initd replacement. Pulseaudio really improved audio on Linux. Distros adopted them because they were good.

The problem is feature creep, exactly like the OP post. For some reason, Poettering’s projects can’t contain themselves to a problem space. Converting init systems is a lot of work, and even if Debian had recognized the feature-creep of systemd as undesirable, there was no way they were going through all of the pain and suffering of another migration. Plus, there isn’t yet a clear successor to systemd. My money is on dinit; s6 is simply too complex, and has too many commands to remember. But the point is, systemd was an excellent initd replacement, and there was a lot of adoption when that’s all it was. And as it grew, distros were already committed and stuck with it (although, journald was there from the beginning, and that should have sounded warning bells).

permalink
report
parent
reply
3 points

As far as I remember Poettering worked for IBM’s RedHat for some time and then the systemd lobbying vibe became stronger (with Fedora being the RedHat toy). Nowadays Poettering works for Microsoft, btw.

permalink
report
parent
reply
12 points

mesa and linux is also “uber projects” i think in certains canes you can’t run away from them, systemd is the same, but for privilegiated processes that need to be well integrated for security reasons

permalink
report
parent
reply
14 points

While I agree that sometimes Uber projects happen, for efficiency or security reasons, I don’t think that Mesa is a good example as they have a scope (implement the OpenGL/Vulkan API) and stick to it.

Systemd is already confusing because of it referencing two different projects, and the overarching systemd projects scope just increases on a regular basis without what appears to external observers as a plan.

permalink
report
parent
reply
7 points

Is journald still binary? That alone made me turn away. I am using PCLinuxOS hence am systemd free. Stopped reading up on it.

permalink
report
parent
reply
2 points

systemd is a group of projects, they can create as much projects inside the name systemd tho

permalink
report
parent
reply
1 point

I just want Sudo registered to a hardware key. No sudo for you unless you plug in your key.

Let’s get back to the old hacker movies where burglary was involved.

permalink
report
parent
reply
18 points

This sounds like a great improvement. I have read the sudo source code and anyone that seriously thinks there’s no problem with it being SUID is crazy.

That said the whole security model of sudo makes no sense. As soon as you can access a sudoers’ account you can trivially steal their password by MitMing sudo and waiting.

permalink
report
reply
1 point

the whole security model of sudo makes no sense

I think that is a bit strong. Sure, you aren’t gaining much protection if you just allow sudo -su root but there are a lot of valid use cases.

  1. Logging.
  2. A bit of an “explicit” check to keep you from doing something stupid without thinking.
  3. You can configure sudo to only allow specific commands from different users. (Maybe a trusted friend should have permission to reboot your Minecraft server but nothing else)
permalink
report
parent
reply
18 points

So went are we going to fully switch from GNU/Linux to SystemD/Linux?

permalink
report
reply
9 points

Sudo isn’t GNU tho.

permalink
report
parent
reply
13 points

It was meant as joke and somehow I knew I’d get a “well asckually…”

permalink
report
parent
reply
-3 points

You forgot /s

permalink
report
parent
reply
2 points

Why would they remake core utils?

permalink
report
parent
reply

Of course it does.

permalink
report
reply
12 points

Is there something wrong with doas? I thought doas was smaller with less of an attack surface.

permalink
report
reply
8 points

The only problem I found was, that it has no real alternative to sudoedit

permalink
report
parent
reply
2 points

Is that similar to visudo?

permalink
report
parent
reply
0 points

Not really visudo is only to edit the sudoers file. sudoedit is a better way to edit system files.

  1. Temporary copies are made of the files to be edited with the owner. set to the invoking user.

  2. The editor specified by the policy is run to edit the temporary files. The sudoers policy uses the SUDO_EDITOR, VISUAL and EDITOR environment variables (in that order). If none of SUDO_EDITOR, VISUAL or EDITOR are set, the first program listed in the editor sudoers(5) option is used.

  3. If they have been modified, the temporary files are copied back to their original location and the temporary versions are removed.

permalink
report
parent
reply
4 points

It seems Poettering is convinced doas, while decreasing attack surface, depends on SUID binary implementation which is a concern in its own right. Poettering is trying to eliminate that dependency in his `run0’ implementation to reduce the attack surface even further.

The relevant excerpt from the long chain of posts from Poettering’s mastodon.social account is copied below:

… led various people to revisit the problem and come up with alternatives: most prominently there’s probably OpenBSD’s sudo replacement called “doas”. While it greatly simplifies the tool and removes much of the attack surface, it doesn’t change one key thing: it’s still a SUID binary.

I personally think that the biggest problem with sudo is the fact it’s a SUID binary though – the big attack surface, the plugins, network access and so on that come after it it just make the key problem… … worse, but are not in themselves the main issue with sudo.

SUID processes are weird concepts: they are invoked by unprivileged code and inherit the execution context intended for and controlled by unprivileged code. By execution context I mean the myriad of properties that a process has on Linux these days, from environment variables, process scheduling properties, cgroup assignments, security contexts, file descriptors passed, and so on and so on. A few of these settings the kernel is nice…

… enough to clean up automatically when a SUID binary is invoked, but much of it has to be cleaned up by the invoked suid binary. This has to be done very very carefully, and history has shown that SUID binaries are generally pretty shit at that.

So, in my ideal world, we’d have an OS entirely without SUID. Let’s throw out the concept of SUID on the dump of UNIX’ bad ideas. An execution context for privileged code that is half under the control of unprivileged code and that needs careful, … … manual clean-up is just not how security engineering should be done in 2024 anymore.

With systemd v256 we are going one step towards this. There’s a new tool in systemd, called “run0”. Or actually, it’s not a new tool, it’s actually the long existing tool “systemd-run”, but when invoked under the “run0” name (via a symlink) it behaves a lot like a sudo clone. But with one key difference: it’s not in fact SUID. Instead it just asks the service manager to invoke a command or shell under…

… the target user’s UID. It allocates a new PTY for that, and then shovels data back and forth from the originating TTY and this PTY.

Or in other words: the target command is invoked in an isolated exec context, freshly forked off PID 1, without inheriting any context from the client (well, admittedly, we do propagate $TERM, but that’s an explicit exception, i.e. allowlist rather than denylist).

One could say, “run0” is closer to behaviour of “ssh” than to “sudo”, in many ways. Except that…

it doesn’t bother with encryption or cryptographic authentication, key management and stuff, but instead relies on the kernel’s local identification mechanisms.

run0 doesn’t implement a configuration language of its own btw (i.e. no equivalent of /etc/sudoers). Instead, it just uses polkit for that, i.e. how we these days usually let unpriv local clients be authorized by priv servers.

By isolating the contexts and the resources of client and target we remove some other classes of attacks…

… entirely, for example this stuff:

https://ruderich.org/simon/notes/su-sudo-from-root-tty-hijacking

But enough about all that security blabla. The tool is also a lot more fun to use than sudo.

Read the rest where he explains run0’s use and functionality beyond the design logic.

permalink
report
parent
reply
2 points

Thanks for the insight. I think I understand what he is trying to do but is a little too low-level for me to really grasp the technicalities.

permalink
report
parent
reply
3 points

it is. arguing attack surface with systemd IMO is a losing battle though.

permalink
report
parent
reply
2 points

Why do you say that? It seems that Poettering’s reasoning for avoiding SUID binaries is sound.

permalink
report
parent
reply
2 points

Some scripts or programs assume sudo by default. It’s a stupid thing but also annoying.

permalink
report
parent
reply
-2 points

The main problem with sudo and doas is that they are not developed by Lennart. Seriously.

permalink
report
parent
reply
1 point

I consider that a positive.

permalink
report
parent
reply

Linux

!linux@programming.dev

Create post

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

Community stats

  • 2.5K

    Monthly active users

  • 600

    Posts

  • 4.8K

    Comments