Quoting Alessandro Selli <alessandrose...@linux.com>:

On Wed, 12 Apr 2017 at 14:18:34 -0700 Rick Moen <r...@linuxmafia.com> wrote:

Quoting Alessandro Selli (alessandrose...@linux.com):

  As sudo can be made to operate either requiring the user to type his
own password or no password, stating (now) that just "a particular usage
model" of sudo constiutes a proxy for the superuser's password can only
refer to the case the user has to type his password.  If you think using
an unprivileged user's password to carry out privileged tasks will lead
to a root password bypass by some attacker....

I did not so claim.

  This is what can be logically inferred from what you wrote.

I honestly think my point was abundantly clear.

  No, every time, now included, you always failed to explain how in the world
could typing the superuser's password be considered safer that typing an
underprivileged user's one or no password at all when one has to mount a
filesystem.


I would assume the opposite, given that one can tailor precisely how much access a "sudoer" has when invoking the command, as opposed to a root user who has all the permissions in the world.

That being said, I'm the only user with root permissions (be it via sudo, or su root), and none of the users that interact with these computers daily will get any elevated permissions, ever. :)

--
|_|O|_| Registered Linux user #585947
|_|_|O| Github: https://github.com/dpurgert
|O|O|O| PGP: 05CA 9A50 3F2E 1335 4DC5  4AEE 8E11 DDF3 1279 A281

Attachment: bin3C5DmqejQZ.bin
Description: PGP Public Key

Attachment: pgpu66kDxVjY2.pgp
Description: PGP Digital Signature

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to