I see people talking about doas saying it’s just like sudo but with less features. I’m just wondering if there is any situation where you should use doas or if it’s just personal preference.

  • @[email protected]
    link
    fedilink
    79
    edit-2
    9 months ago

    On the one hand, doas is simpler. Less code means less bugs, and lower chance someone manages to hack it and gain admin rights. On the other hand, sudo is more popular, and so has a lot more people double-checking its security. Ultimately, I don’t think it matters - when someone unauthorized gains admin rights, usually it’s not due to bug in sudo or doas, but other problems.

    • @[email protected]
      link
      fedilink
      159 months ago

      Well said. Check your firewalls, check your ssh config, liberally use user repositories, and always tip the guard (donate to GNU)

  • 柊 つかさ
    link
    209 months ago

    I use doas just because. It’s not necessary at all, but it can’t hurt either (I think). It might be a bit more secure (fewer features -> fewer code -> fewer bugs -> fewer vulnerabilities, need to give password more often). Kinda cool if you want more minimalism for fun (I replaced startx with sx…)

  • Kalcifer
    link
    fedilink
    169 months ago

    doas, afaik, was originally made for FreeBSD, so some of its features aren’t compatible with/haven’t been implemented for Linux. That may or may not be an important issue for you to consider.

  • Doas is more secure, sudo has had a few critical vulnerabilities in the past, because the codebase is much larger. Sudo has like a million features that most people don’t need, but they significantly increase attack surface.

    • @[email protected]
      link
      fedilink
      169 months ago

      Doas is more secure, sudo has had a few critical vulnerabilities in the past, because

      … it’s newer. You wanted to say “it’s newer.” It has nowhere near the history, and looks better because it’s newer.

      Please, now, trot out the “use sudo if you’re old” memes, because we grew that skin extra thick over the systemd counter-hate.

  • @WalrusByte
    link
    English
    139 months ago

    From what I hear, doas is more secure. I don’t think it matters though, as long as you keep your system updated. I use sudo still.

    • ZephrC
      link
      fedilink
      99 months ago

      It’s really only more secure in the sense that in general more complicated programs have more things that can go wrong with them. Either bugs, or just user error.

      That is a valid concern, and most people don’t need or use any of sudo’s extra features, so it’s completely reasonable to switch to doas because of that, but it’s not like there’s some glaring security flaw in sudo that most people really need to worry about. Especially if they’re not doing weird things in the config, which would mostly be the same people who could easily switch to doas anyway.

      • @[email protected]OP
        link
        fedilink
        English
        -2
        edit-2
        9 months ago

        I think it’s because sudo only requires a password the first time on each shell.

        • @[email protected]
          link
          fedilink
          English
          89 months ago

          sudo maintains ‘sudo state’ for 15 minutes. After that you need to enter the password again.

        • Alex
          link
          fedilink
          69 months ago

          It’s entirely configurable but I think by default sudo will “cache” your authentication for a period of time so multiple commands in the same session only need the password entered once. You can even configure sudo to not need a password for certain commands (although obviously you need to be careful you’re not opening a hole in your security).

          • wvstolzing
            link
            fedilink
            29 months ago

            doas is likewise configurable; though the mechanism that keeps track of the timeout is different on OpenBSD (where doas originated) & Linux ---- and there used to be some reservations about the latter implementation.

  • Communist
    link
    fedilink
    English
    129 months ago

    I just use doas because sudo has a bunch of features i don’t care about or use, and doas does everything i need while being significantly smaller.

    • @fuckwit_mcbumcrumble
      link
      159 months ago

      Does the size of a 6kb program really make that much of a difference?

      Side note: If I’m reading this right (ignoring dependencies) sudo is 6kb while doas is 14kb.

          • @[email protected]
            link
            fedilink
            59 months ago

            The concern is not storage space, but potential bugs leading to security issues. For OpenBSD this is very important, and so they made doas.

            • @[email protected]
              link
              fedilink
              English
              19 months ago

              I understand the concern - but it’s not warranted. LOC is a bad predictor of security. And fwiw /usr/bin/sudo on my system is only 227K.

              The OpenBSD team does fantastic work. I’m assuming doas will be a good tool and probably more secure that sudo generally. But “size” isn’t the best way to determine that. It’s not even a good way.

              • @[email protected]
                link
                fedilink
                29 months ago

                Tedu (author of doas) wrote about it in 2015:
                “There were some concerns that sudo was too big, running too much code in a privileged process. And there was also pressure to enable even more options, because the feature set shipped in base wasn’t big enough. (As shipped in OpenBSD, the compiled sudo was already five times larger than just about any other setuid program.)”
                https://flak.tedunangst.com/post/doas

        • @fuckwit_mcbumcrumble
          link
          English
          149 months ago

          Ya know, I wish I could at least say something about being european and using commas instead of periods for decimal points, but I can’t even say that. Still 6MB fully installed is nothing these days.

          • @[email protected]
            link
            fedilink
            69 months ago

            And here I am wondering what went so wrong with sudo that it needs 6 fucking mibibytes to work its simple magic.

            • @[email protected]
              link
              fedilink
              English
              99 months ago

              Yeah, it’s gonna take forever to download over my 14.4k baud modem.

              STOP PICKING UP THE PHONE MOM!

      • @tabular
        link
        English
        119 months ago

        Less lines of code needed means less chances of errors and potential vulnerabilities (if number and quality of eyeballs were the same)

        • @[email protected]
          link
          fedilink
          39 months ago

          Also only really applies if you are comparing programs in the same programming language as some programs have lines that are significantly more expressive than others. Conversely, some languages have constructs that are significantly more bug-prone than others (e.g. for loops with explicit integer indices instead of higher order functions like map or iterators to iterate over a collection).

          • @tabular
            link
            English
            1
            edit-2
            9 months ago

            Sure, I was just speaking in general.

      • Communist
        link
        fedilink
        English
        29 months ago

        No, but it’s cleaner and designed for my usecase, and no real work to setup for me, all I had to do was add an alias

  • @[email protected]
    link
    fedilink
    129 months ago

    When I thought about this question, I decided to ditch both sudo and doas entirely. I am certain this is an unpopular opinion, but I preferred setting up a granular permission + user system instead, and keeping root privileges for only a handful of use cases (primarily for system updates and package installations).

    For anything else, a dedicated user is created, and given only permissions to do that exact thing only. Many of these users have no shell access at all, and for the ones that do, I use a password manager so I don’t have to memorize passwords for all of these users.

      • @[email protected]
        link
        fedilink
        69 months ago

        Yes I did, and that’s a very good point. What sudo does not allow me to do is grant a user access to modify or read specific files or directories. I can get both that and access to executing specific programs using a users/groups permission system.

        Another thing I don’t like about sudo is that you end up using the same password for everything, which is also the password for logging in. Putting higher privileges behind my same login password opens me to a single point of failure.

    • @[email protected]
      link
      fedilink
      19 months ago

      Why would a system update need privileges? What is the privileged action in pulling and applying updates your distro ships?

      • @[email protected]
        link
        fedilink
        49 months ago

        I mean, that’s one of the things that definitely needs permissions, right? You’re overwriting system config and executables for all users on your system. Otherwise a malicious actor could just replace firewall configs, or embed malicious code into your executables. If not /bin and /etc what else should need privileges?

        • @[email protected]
          link
          fedilink
          49 months ago

          On a mutable distro maybe but also no. You need to update your system, always. The updates come from the distro, and you only invoke your privileged package manager to do these changes for you. Its not privileged.

          If a malicious actor is able to replace package repos that your package manager uses, for example an infected server in the same network, this would be the only way to inject arbitrary stuff by using dnf update or rpm-ostree update.

          Installing software and updating the already existing is very different.

      • @[email protected]
        link
        fedilink
        29 months ago

        The short answer is that my distro did not let me do this easily. But that was for good reason.

        A system update would require too many privileges that it would be almost indistinguishable from root.

        Currently, every user I have is restricted in what files it has access to. A system update user would need access to so many files, including install locations of all binaries, and non-binary installation paths of all current and future programs I install (some package installs modify /var, many modify /etc, and so on).

        This user will also have access to all these programs, down to system applications. It can trivially break a permission system I come up with.

        It may be possible to restrict system updates to a user, but it would be such a powerful user that its not really worth it.

        • @[email protected]
          link
          fedilink
          19 months ago

          Does the user have that access? In my case with rpm-ostree they can just execute 2 commands rpm-ostree refresh-md (get updates) and rpm-ostree update. rpm-ostree rebase is used for system upgrades afaik, that one needs a password.

          • @[email protected]
            link
            fedilink
            19 months ago

            Only the root user has access to system updates on my system currently.

            What does rpm-ostree update do exactly? Does it execute the update? Or is that the rebase command only?

            • @[email protected]
              link
              fedilink
              19 months ago

              No rpm-ostree downloads the diffs, applies existing changes (added or removed packages) and builds a new image that gets staged as first boot target. After reboot you are on an updated system.

              • @[email protected]
                link
                fedilink
                39 months ago

                If it builds a new image that replaces the entire system it could be compromised to give full access to the entire system just as easily as sudo, possibly more easily.

              • @[email protected]
                link
                fedilink
                29 months ago

                I see. I have little knowledge, but I bet that the “root privileges” part of this process is the reboot. Upon rebooting, system updates are applied from the new image via some privileged process.

                That’s pretty neat. Unfortunately I haven’t ventured deeply enough into that type of system yet (was it called immutable distro or something?). I use gentoo, which doesn’t support this out of the box.

                Thanks for showing me something new!

                • @[email protected]
                  link
                  fedilink
                  19 months ago

                  Rebooting does not need root privileges either, on no system. There really is nothing privileged about updating already existing software. Android is completely rootless and updates are automatic, but can be done manually too.

                  You can read a bit into OSTree, its very cool. But seems to be very complex and somehow they want to switch to OCI images now, idk.

                  But the way ublue builds their systems is astonishing, elegant, simple, structured and fully automated.

      • @[email protected]
        link
        fedilink
        -19 months ago

        What is the privileged action in pulling and applying updates your distro ships

        Tell me again how you want to write system files with a non-admin account, and I’m going to show you my friend Lumpy, who will walk all over your machine so fucking fast. Fuck that, Lumpy’s a genius. One of his underlings (he manages now) will do it on a lunch break.

  • @[email protected]
    link
    fedilink
    89 months ago

    Doas has about 90% of features with 10% of code size of sudo.

    And rdo/ssu have ~140 lines of C code. Anyone knows similiar?

  • @[email protected]
    link
    fedilink
    89 months ago

    Well, i believe in all showcased cases from people here, they are NOT replacing sudo entirely (Except if some are from BSD or if I’m incorrect with this assumption). They are just replacing their user habit with doas and use that command instead. In the end, all unix scripts or apps expect using sudo (If not, su) so… ### What’s even the need to ?

    • Size : Installed on top of the already system present sudo.
    • Security : Only perhaps if you made a sudo alias to doas (But since it isn’t entirely 1:1 identical, if anyone have a cleaner way of implementing that, I’m all hear)
    • Simplicity : You now have two tools. A easy to use keycard, and a key. The second is more complicated to use, so you use it rarely but it’s still two tools instead of one.
    • Less dependencies : Again, unless you can actually replace it ENTIRELY, it’s just an added tool (Still almost dependency free)

    Really looking to corrections if i do some

  • Presi300
    link
    English
    79 months ago

    You feel smarter… Yeah, that’s pretty much it.

  • @Samueru
    link
    69 months ago

    doas uses like 10MIB less of mem than sudo.

      • @Samueru
        link
        19 months ago

        Because it is not exactly 10MiB. Should have used about instead of like though.

          • @Samueru
            link
            7
            edit-2
            9 months ago

            MiB and MB are not the same thing. Just that many CLI tools in linux use MiB instead so I just got used to typing MiB lol.

            • @[email protected]
              link
              fedilink
              59 months ago

              The difference between MB and MiB is 24 kilobytes

              My point is that if you’re already estimating, the difference is negligible

              • @[email protected]
                link
                fedilink
                39 months ago

                24 kibibytes. I dislike the annoying difference between kiB and kB, etc, etc as I also think in kB and MB as the binary values because that’s how I was taught for many years.

  • @[email protected]
    link
    fedilink
    49 months ago

    Security may be more likely to approve some users having doas, sudo is a no go in many restricted environment.