On 20.11.2011 19:30, Luca Capello wrote: > Perfectly fine for me, but IMHO policykit is abusing sudo, given that > with /etc/polkit-1/localauthority.conf.d/51-debian-sudo.conf pkexec > grants any privilege to members in the sudo group *without* checking if > this group is actually allowed in /etc/sudoers* (this *is* a bug): .. > It is not about what I do or do not want, sudo != administrator, as > explained in /usr/share/doc/base-passwd/users-and-groups.txt.gz (but see > also #600700 for the current real situation): This was discussed before the squeeze release. We were looking for a mechanism how we could grant administrative privileges to users (eg. if installed with a disabled root account). We decided to use a group for this purpose. I personally favored to use group "admin", but due to various reasons (similarity to adm, etc) we finally agreed to use group sudo for that. We, that included the sudo maintainer. So, I fail to see how you consider this abusing sudo. -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth?
Description: OpenPGP digital signature