"Nah man, you should just install this terminal app and memorize 500 shortcuts to go back one directory"

  • AlkaliMarxist
    ·
    edit-2
    1 year ago

    The "root user" concept is so bad for security, and the first thing a new user learns is "if something doesn't work, try it with sudo". You figure that out before you even know what sudo does.

    • hes_fired [none/use name]
      ·
      1 year ago

      Its a terrible model. honestly, the existing Unix/ring(n) model and the windows user model don't work for modern, single-user devices.but do much hardware and software architecture is built around it that it's hard to switch at this point

      • blobjim [he/him]
        ·
        1 year ago

        I feel like Microsoft is also just incredibly lazy. I think they could come up with a way to do sandboxing in at least a migratable way (so still-maintained applications can opt-into it) like they sorta tried with UWP, but there's just no money in it. Plus they do security consulting stuff so it's not like vulnerable software hurts their profits much.

    • Shoegazer [he/him]
      hexagon
      ·
      1 year ago

      I mean this is also how it works in Windows with Admin mode, but I think I've had to use sudo to do many more things than I had to use admin in windows.

      • AlkaliMarxist
        ·
        1 year ago

        Yeah, Windows uses the same flawed permissions model but in Unix so many tasks require root access. It reminds me of Vista's UAC implementation where it prompted for admin access so often a lot of people just turned it off.

        • silent_water [she/her]
          ·
          1 year ago

          it's because most distributions don't build and install packages with user permissions. check out home-manager for a fix to this.

          • AlkaliMarxist
            ·
            1 year ago

            Thanks for the recommendation, I might give this a go.

            Based on the description on their github page, this isn't really mature enough to help the non-technical user who's copy pasting sudo commands though.

            • silent_water [she/her]
              ·
              1 year ago

              yeah, it's just a new model we could use and I'd like to see something similar get adopted by most distros.

    • silent_water [she/her]
      ·
      1 year ago

      "this doesn't work, try it with sudo" is a recipe for bricking your machine.

      • Shinji_Ikari [he/him]
        ·
        1 year ago

        There's higher resolution privilege approaches that aren't on/off but you'll typically see those in the form of manually configured user profiles and stuff. things the average desktop user just doesn't care for.

      • blobjim [he/him]
        ·
        1 year ago

        If you download a mobile app, you get asked all kinds of things, like whether you want to allow location, access to the local network, file access, etc. (what things should the program be able to do and know). Desktop and server operating systems mostly don't have these because they were developed so long ago (and Micro$oft is lazy and incompetent).

      • AlkaliMarxist
        ·
        1 year ago

        The best solution that's been proposed IMO is something called capability based security, which allows a hierarchy of trusted brokers to delegate very specific permissions for specific resources (files, hardware access, system calls) to applications. Rather than having the applications run as a "user" and inherit all the users permissions, the application is passed cryptographically secure "keys" representing a temporary permission to perform specific actions on a resource.

        That's a big change to existing models though, a less dramatic solution would be applications running under an unprivileged user context then specifically requesting access to various features and files, like the Access Control List system Android layers on top of Linux ("do you want to allow this application to make phone calls etc.") or having multiple user accounts with varying privileges and applications requesting temporary permissions to run under the required user rather than having one big root account that does everything and everything needs access to.

        The big problem with the root user is that for every privilege you choose to restrict to the root (or administrator), as soon as an application needs to perform one of those actions it must also get access to every single other interface protected by the root user account. Configuring network interfaces requires root access, but anything allowed to configure a network interface automatically is also allowed to read and write every single file on the system, including drivers, the kernel code and the boot structures.