[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: hp-plugin installation woes on Debian Live

I'm not sure I see how this is related to backports.

On Thu, 14 Feb 2019 at 16:35:52 +0100, Ronny Standtke wrote:
> On Debian Live we have the followig setup:
> The user "user" has full sudo access without any password:
> $ cat /etc/sudoers.d/live
> The user "root" has no password:
> # cat /etc/shadow | grep root
> root:*:17941:0:99999:7:::

If this is how Debian Live is set up, then it should probably also
configure polkit (policykit-1) to allow "user" to be considered as
root-equivalent (a sysadmin), and to allow root-equivalent users to
do some things that would normally require authentication without

> When I run the command hp-plugin as a normal user I get a graphical
> dialog (translation to ASCII by me):
>  ----------------------------------------------------------
> |       HP Device Mangager - Enter Username/Password       |
> ------------------------------------------------------------
> | Your HP Device requires to install HP proprietary plugin |
> | Please enter root/superuser password to continue.        |
> |                     --------------------------           |
> | Username:          |root                      |          |
> |                     --------------------------           |
> |                     --------------------------           |
> | Password:          |                          |          |
> |                     --------------------------           |
> |                                         ---------------- |
> |                                        |       OK       ||
> |                                         ---------------- |
> ------------------------------------------------------------

This is probably a polkit agent, which is part of whatever desktop
environment you're using. (In GNOME it's part of gnome-shell.)

> The Username inputfield (already filled with the value "root") is not
> editable.

That's because polkit thinks root is the only root-equivalent user
(sysadmin). If Debian Live wants polkit to think "user" is also a
sysadmin, it should either add "user" to the sudo group, or add a
configuration snippet in /etc/polkit-1/localauthority.conf.d to make
"user" be one of the AdminIdentities. I would recommend the former,
because some polkit policies specifically refer to the sudo group.

Adding "user" to the sudo group works because the policykit-1

    # /etc/polkit-1/localauthority.conf.d/51-debian-sudo.conf

This means "every user in the sudo group is to be considered to be a
sysadmin". (See /usr/share/doc/base-passwd/users-and-groups.txt.gz)

Normally, polkit policies require an admin user to authenticate.
For example, /usr/share/polkit-1/actions/org.freedesktop.packagekit.policy
says that by default, admin users can do an upgrade using PackageKit,
but they have to authenticate first:

  # /usr/share/polkit-1/actions/org.freedesktop.packagekit.policy
  <action id="org.freedesktop.packagekit.trigger-offline-upgrade">
    <description>Trigger offline updates</description>

However, files can be installed into
/var/lib/polkit-1/localauthority/10-vendor.d/ by packages, or into
/etc/polkit-1/localauthority/*.d by local sysadmins, to override this;
and in fact packagekit installs one itself, to let members of the
sudo group upgrade without entering a password:

    # /var/lib/polkit-1/localauthority/10-vendor.d/org.freedesktop.packagekit.pkla
    [Allow admins to upgrade the system]

If configuration fragments like this are considered to be appropriate for
live systems, Debian Live could install some.

For example, if Debian Live wants members of the "sudo" group to be
able to do *anything* that is mediated by polkit, without any prompting,
it could install something like this (untested):

    # /etc/polkit-1/localauthority/30-site.d/debian-live.pkla
    [Make sudo group completely root-equivalent, with no prompting]


Reply to: