I like doas(1) much better. doas.conf(5) is simple, I understand it thoroughly.
That is the reason why I switched. doas.conf(5) is straightforward. I can config what I need quickly, without getting lost in the docs.
I like doas(1) much better. doas.conf(5) is simple, I understand it thoroughly.
There's a different, better word than folklore for his statement.This is folklore. Stop it.
I've worked in one organisation that was this sort of size, and I hated that we never configured security/sudo properly. Any developer was allowed to have full root access via the sudo command ?Try maintaining 900+ servers running a myriad of different software. We maintain the platform, other specialized teams maintain the software.
Wow! How can you take responsibility when you have no control? Your managers were incompetent.Any developer was allowed to have full root access via the sudo command ?
That's true for routine deployments, but you still need to deal with full file systems, network maladies, "hardware" re-configurations, SAN/storage changes, runaway processes, OOM events, wedged systems, unexplained phenomena,...At work today, no one really gets root access. You make a change in source control, relevant people review the change, it gets deployed to a staging environment and tested, then rolled out to production. Anyone can make the change, only key people can review, merge, and promote it.
? A common pattern. I was sideswiped at my place, too. Although, in my case, it was PM not understanding how firewalls work on the network.Dev: We need to be able to run commands as root
Me: OK, what commands?
Dev: Oh I don't know, many commands - hey PM, this guy is wasting my time and blocking the project
PM: <talks to relevant parties, authorises Dev to have unfettered access>
I suppose the caveat to this story is that the access should have been removed before the servers went into production. That wasn't my responsibility in that organisation, but I suspect it wasn't revoked...
There's a different, better word than folklore for his statement.
I'm guilty of this ? But honestly, it can be very hard to enumerate all the possible commands you might need for properly supporting certain systems. We have managed to work out a reasonable list of commands for the production system at least.Dev: We need to be able to run commands as root
Me: OK, what commands?
Dev: Oh I don't know, many commands -
And then it was the PM's ass on the line when there was that massive data breach that cost the company millions in lawsuits and lost revenue, right? (Yeah. That's sarcasm.)Dev: We need to be able to run commands as root
Me: OK, what commands?
Dev: Oh I don't know, many commands - hey PM, this guy is wasting my time and blocking the project
PM: <talks to relevant parties, authorises Dev to have unfettered access>
Never had a need in 25 years. I still sometimes get root despite my best efforts, usually because sysops wants my help.I'm guilty of this ? But honestly, it can be very hard to enumerate all the possible commands you might need for properly supporting certain systems. We have managed to work out a reasonable list of commands for the production system at least.
PM: <talks to relevant parties, authorises Dev to have unfettered access>
At least it won't be yours.And then it was the PM's ass on the line when there was that massive data breach that cost the company millions in lawsuits and lost revenue, right?
It turned out "doas" stands for
Some notes:
Note I:
Until few days ago, I thought "doas" is pronounced "do-as", i.e. do (run) as [user X]. It turned out "doas" stands for "Dedicated OpenBSD Application Aubexecutor".
Note II:
Using "permit" is superior to "deny". It prevents to bypass the rule, via changing the path and/or name of the command.
doas - dedicated openbsd application subexecutor
where you can find all about permit & deny.So here is the official doas mastery book. Or pamphlet, anyway.
The one doesn't make the other wrong, it was probably meant to stand for both at the same timeUntil few days ago, I thought "doas" is pronounced "do-as", i.e. do (run) as [user X]. It turned out "doas" stands for "Dedicated OpenBSD Application Aubexecutor".
I'd take that with a grain of salt. Tedu@ has a sense of humour:Note I:
Until few days ago, I thought "doas" is pronounced "do-as", i.e. do (run) as [user X]. It turned out "doas" stands for "Dedicated OpenBSD Application Aubexecutor".
Fortunately, over there, having a sense of humour is still a feature. The last two paragraphs: KARL - kernel address randomized linkI'd take that with a grain of salt. Tedu@ has a sense of humour:
Thanks for detailed explanation of the matter. 47:47, nice timecode! I don't follow that podcast, so I'll take your word for it, and call it do as, as is.The inventor of doas(1) is Ted Unangst (for example see: Developing Software in a Hostile Environment by Ted Unangst). I don't have a pronunciation example of doas by him. Closer to home: I have tracked down an example by Benedict Reuschling & Allan Jude: BSD Now, Episode 305 (Changing face of Unix) starting at around 47:47 min (doas environmental security) where it is pronounced as "do-as". Don't know anything about the "do (run) as [user X]" part though.
That's the dark humour.Fortunately, over there, having a sense of humour is still a feature. The last two paragraphs: KARL - kernel address randomized link
not as dark asThat's the dark humour.
# /bin/kill -9
...Which also means there could still be lots of security issues hiding that just haven't been found yet because it doesn't get the same attention. Absence of evidence is not the same as evidence of absence.DOAS is not largely used like SUDO, thus, it ends up not being the focus of hackers (at least so far).
I agree. By the same reasoning however, one could assert the reverse: "software" (as part of an OS that is dominant all over the planet) is therefore "likely to have less security issues" because it has such a large attack vector that (dormant) security issues surely must all have come up ( ... and will have been mitigated quickly ... ). I know this may not be an apples to apples comparison but I can think of one particular OS.Which also means there could still be lots of security issues hiding that just haven't been found yet because it doesn't get the same attention. Absence of evidence is not the same as evidence of absence.