Thanks for taking the time to report your issue. In this case, the tools
you're highlighting do not use sudo, but instead use policykit-1 to
verify privileges. In order to require the root password instead of your
user's password to operate those utilities, you'll need to modify your
policykit configuration to do so. Specifically, you'll need to override
the configuration in /etc/polkit-1/localauthority.conf.d/51-ubuntu-
admin.conf ; you can do this by creating a conf file that begins with a
higher number in /etc/polkit-1/localauthority.conf.d/ (e.g. 60-local-
admin.conf). Copying the contents of
/etc/polkit-1/localauthority.conf.d/50-localauthority.conf into it
(specifically setting 'AdminIdentities=unix-user:0') will cause
policykit to require the root password when authenticating for
administrative privileges.
You can verify this by using pkexec as well as the other tools you
listed above; e.g. "pkexec date" should require the root password after
changing your configuration.
And of course, you'll want to be careful making changes to your
policykit configuration, as you could be creating a security exposure
for yourself.
** Package changed: sudo (Ubuntu) => policykit-1 (Ubuntu)
** Changed in: policykit-1 (Ubuntu)
Status: New => Invalid
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/1643931
Title:
Security problem with Super User Authorization
Status in policykit-1 package in Ubuntu:
Invalid
Bug description:
luca@pc-sala:~$ lsb_release -rd
Description: Ubuntu 16.04.1 LTS
Release: 16.04
luca@pc-sala:~$
luca@pc-sala:~$ apt-cache policy sudo
sudo:
Instalados: 1.8.16-0ubuntu1.2
Candidato: 1.8.16-0ubuntu1.2
Tabla de versión:
*** 1.8.16-0ubuntu1.2 500
500 http://pe.archive.ubuntu.com/ubuntu xenial-updates/main amd64
Packages
100 /var/lib/dpkg/status
1.8.16-0ubuntu1 500
500 http://pe.archive.ubuntu.com/ubuntu xenial/main amd64 Packages
500 http://archive.ubuntu.com/ubuntu xenial/main amd64 Packages
luca@pc-sala:~$
On my system I have 3 accounts (me, my wife and my son), My account is the
only that can use SUDO, the others are desktop users.
I need to limit the access to my son (5 years old), so I had to put the
password to my login, but my password was very strong: large and complicate.
Otherwise I need to use sometimes SUDO (truecrypt, rsync with other devices,
etc.).
In order to simplify my login and keep the ability to use SUDO I activated
the "targetpw" flag in sudoers, so now my login password is quite easy and ROOT
account has the strong password.
It works, programs like synaptic, sudo, gksu and others accept the root
password, but I found a very very strange behaviours in some programs, for
example:
a) users-admin
b) gnome-language-selector
c) lightdm-gtk-greeter-settings-pkexec
Those programs perform admin tasks and I suppose that when they ask for the
password authorization they need the root password.
No! They want my personal account password, the root password is not accepted.
I think that this is not right, because my system now has a security
weakness, and I don't know how many other programs have the same
behaviour. This could be a serious security breach.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/policykit-1/+bug/1643931/+subscriptions
--
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help : https://help.launchpad.net/ListHelp