Message from @Snans
Discord ID: 633817202579079179
For the sysadmin among us https://thehackernews.com/2019/10/linux-sudo-run-as-root-flaw.html
clickbait title
> The only situation where this can be exploited is when you allow a user to execute something as any other users except root. This seems pretty obscure and probably affects only an extremely small number of configurations.
so in any time someone can remote execute any code in your system
no, when you put `(ALL, !root)` in sudoers
any compromissed system just got Boom level up to root
why you would do that i have no idea
it's an extremely limited use case
i'd be surprised if anyone actually is vulnerable to it
also that linked website is cancer jesus
on that i agree
Well, at my workplace we use something quite close for a specific use case
We just don't do an everybody except root but specify the users
why do you need to impersonate other users
Application user
We have named users for 'humans' and application users for application
And sometimes humans have to impersonate application users
this is getting out of hand
now there's two of them
I always had 2 accounts
arch is fugged for me
Have you tried installing arch?
yea I've been running it for a while
pacman is broken, dont feel like repartitioning so looking for another OS
Thats be devuan,slackware,void to name the generic few
do you use any of em
Used to have void partition waaay back when systemd got forced
And devuan is really nice what i have heard
yea looks pretty nice
tho I think it doesnt use official debian repos
also heard void's package manager is kinda a pain, may give it a go tho
>300mbit router
>only 100mbit when wired
<:blobthinkingeyes:427568214579609601>
Useful only when you need bandwidth between wifi devices
wait does that mean if I stream from my desktop to my laptop using plex I would get better connection if both devices are using wifi instead of being connected to an ethernet cable ?
<:googlethink:328536447219138561>
wtf is that ass backwards kind of router