mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Add semantic newlines for vm-sudo.md
This commit is contained in:
parent
853d67f7d9
commit
f57885166b
@ -85,7 +85,9 @@ Below is a complete list of configuration made according to the above statement,
|
|||||||
|
|
||||||
- NetworkManager configuration from normal user (nm-applet)
|
- NetworkManager configuration from normal user (nm-applet)
|
||||||
- updates installation (gpk-update-viewer)
|
- updates installation (gpk-update-viewer)
|
||||||
- user can use pkexec just like sudo Note: above is needed mostly because Qubes user GUI session isn't treated by PolicyKit/logind as "local" session because of the way in which X server and session is started. Perhaps we will address this issue in the future, but this is really low priority. Patches welcomed anyway.
|
- user can use pkexec just like sudo Note: above is needed mostly because Qubes user GUI session isn't treated by PolicyKit/logind as "local" session because of the way in which X server and session is started.
|
||||||
|
Perhaps we will address this issue in the future, but this is really low priority.
|
||||||
|
Patches welcomed anyway.
|
||||||
|
|
||||||
3. Empty root password
|
3. Empty root password
|
||||||
- used for access to 'root' account from text console (xl console) - the only way to access the VM when GUI isn't working
|
- used for access to 'root' account from text console (xl console) - the only way to access the VM when GUI isn't working
|
||||||
@ -94,12 +96,11 @@ Below is a complete list of configuration made according to the above statement,
|
|||||||
Replacing passwordless root access with Dom0 user prompt
|
Replacing passwordless root access with Dom0 user prompt
|
||||||
--------------------------------------------------------
|
--------------------------------------------------------
|
||||||
|
|
||||||
While ITL supports the statement above, some Qubes users may wish to enable
|
While ITL supports the statement above, some Qubes users may wish to enable user/root isolation in VMs anyway.
|
||||||
user/root isolation in VMs anyway. We do not support it in any of our packages,
|
We do not support it in any of our packages, but of course nothing is preventing the user from modifying his or her own system.
|
||||||
but of course nothing is preventing the user from modifying his or her own
|
A list of steps to do so is provided here **without any guarantee of safety, accuracy, or completeness.
|
||||||
system. A list of steps to do so is provided here **without any guarantee of
|
Proceed at your own risk.
|
||||||
safety, accuracy, or completeness. Proceed at your own risk. Do not rely on
|
Do not rely on this for extra security.**
|
||||||
this for extra security.**
|
|
||||||
|
|
||||||
1. Adding Dom0 "VMAuth" service:
|
1. Adding Dom0 "VMAuth" service:
|
||||||
|
|
||||||
@ -116,7 +117,8 @@ this for extra security.**
|
|||||||
auth requisite pam_deny.so
|
auth requisite pam_deny.so
|
||||||
auth required pam_permit.so
|
auth required pam_permit.so
|
||||||
|
|
||||||
- Require authentication for sudo. Replace the first line of /etc/sudoers.d/qubes with:
|
- Require authentication for sudo.
|
||||||
|
Replace the first line of /etc/sudoers.d/qubes with:
|
||||||
|
|
||||||
user ALL=(ALL) ALL
|
user ALL=(ALL) ALL
|
||||||
|
|
||||||
@ -132,7 +134,8 @@ this for extra security.**
|
|||||||
auth requisite pam_deny.so
|
auth requisite pam_deny.so
|
||||||
auth required pam_permit.so
|
auth required pam_permit.so
|
||||||
|
|
||||||
- Require authentication for sudo. Replace the first line of /etc/sudoers.d/qubes with:
|
- Require authentication for sudo.
|
||||||
|
Replace the first line of /etc/sudoers.d/qubes with:
|
||||||
|
|
||||||
user ALL=(ALL) ALL
|
user ALL=(ALL) ALL
|
||||||
|
|
||||||
@ -156,4 +159,5 @@ this for extra security.**
|
|||||||
Dom0 passwordless root access
|
Dom0 passwordless root access
|
||||||
-----------------------------
|
-----------------------------
|
||||||
|
|
||||||
There is also passwordless user->root access in dom0. As stated in comment in sudo configuration there (different one than VMs one), there is really no point in user/root isolation, because all the user data (and VM management interface) is already accessible from dom0 user level, so there is nothing more to get from dom0 root account.
|
There is also passwordless user->root access in dom0.
|
||||||
|
As stated in comment in sudo configuration there (different one than VMs one), there is really no point in user/root isolation, because all the user data (and VM management interface) is already accessible from dom0 user level, so there is nothing more to get from dom0 root account.
|
||||||
|
Loading…
Reference in New Issue
Block a user