2009/4/5 John McCabe-Dansted <gma...@gmail.com>:
Adding something like
  %sudo ALL=NOPASSWD: aptitude update
to the sudoers gives almost the right rights. If there is no user
input into aptitude, then this does not add any new such security
holes.

/usr/bin/aptitude would be safer, but yes.

However, Update-manager allows the user to unselect updates. So to
allow non-root users to do a selective upgrade, we'd have to pass in
the packages to update, running a risk that these package names are
malicious and cause Update-manager to do something bad. I imagine this
risk could be made quite small

What I'm talking about is unknown security holes, which unfortunately lots of 
apps seem to have. Is the risk of any being present sufficiently small?
Does using sudo rather than suid bit have any advantages security wise (apart 
from the obvious limits on which users can run the program)?

Still, an overnight auto-update seems like a sensible default for
novice users who don't need or want to know what an update is. This is
what I set my computer too when I am overseas and leave my computer on
for family to use.

I agree, I think automatic updates are a good idea in general.
Perhaps there are ways of getting around the issues people have mentioned with 
updates stopping current processes from working properly? I don't know but it 
seems like that would mean changes to the way dpkg works (or at least some 
clever scheduling by apt(itude).


--
Matt Wheeler
m...@funkyhat.org

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss

Reply via email to