←back to thread

466 points CoolCold | 1 comments | | HN request time: 0.277s | source
Show context
segasaturn ◴[] No.40212733[source]
I asked this in a thread about this from last night and didn't get a reply. For context, the way "run0" works is to apparently send a signal to polkit that requests a command under the root user's ID and permissions, thereby getting a privileged shell without SUID:

> How hard would it be to create a program to send a signal to polkit "impersonating" run0 and obtain a root shell without entering a password?

Anybody know how this is being authenticated?

replies(2): >>40212982 #>>40214434 #
1. ongy ◴[] No.40212982[source]
Without looking at the he specific implementation

There should be a service running as uid=0 that exposes an unprivileged API.

This service then takes the RPC and does authorization with polkit.

I.e. the unprivileged part doesn't talk to polkit directly. But a privileged part uses polkit instead of a custom sudoers style config.