]> The &tdesu; handbook &Geert.Jansen; &Geert.Jansen.mail; JohnKnight
anarchist_tomato@herzeleid.net
Conversion to British English
2000 &Geert.Jansen; &FDLNotice; 2002-01-18 1.00.00 &tdesu; is a graphical front end for the &UNIX; su command. KDE su password root
Introduction Welcome to &tdesu;! &tdesu; is a graphical front end for the &UNIX; su command for the K Desktop Environment. It allows you to run a program as different user by supplying the password for that user. &tdesu; is an unprivileged program; it uses the system's su. &tdesu; has one additional feature: it can remember passwords for you. If you are using this feature, you only need to enter the password once for each command. See for more information on this and a security analysis. This program is meant to be started from the command line or from .desktop files. Although it asks for the root password using a &GUI; dialogue, I consider it to be more of a command line <-> &GUI; glue instead of a pure &GUI; program. Using &tdesu; Usage of &tdesu; is easy. The syntax is like this: tdesu USER -n -t -q -d -f FILE -c COMMAND ARG1 ARG2 tdesu -v -h -s The command line options are explained below. This specifies the program to run as root. It has to be passed in one argument. So if, for example, you want to start a new file manager, you would enter at the prompt: tdesu This option allow efficient use of &tdesu; in .desktop files. It tells &tdesu; to examine the file specified by FILE. If this file is writable by the current user, &tdesu; will execute the command as the current user. If it is not writable, the command is executed as user USER (defaults to root). FILE is evaluated like this: if FILE starts with a /, it is taken as an absolute filename. Otherwise, it is taken as the name of a global &kde; configuration file. For example: to configure the K display manager, tdm, you could issue tdesu Enable terminal output. This disables password keeping. This is largely for debugging purposes; if you want to run a console mode app, use the standard su instead. Do not keep the password. This disables the keep password checkbox in the password dialogue. Be quiet. Show debug information. Print version information and exit. Print some help. Stop the tdesu daemon. See . Configuration &tdesu; comes with a control module named kcmtdesu. You can find it in the K menu under Settings Applications KDE su. You can change the following things: Echo Mode This is how characters you type are echoed to the screen. Possible choices are: one star per character, three stars or no echo at all. The default is one star per character. Keeping passwords You can instruct &tdesu; remember passwords you enter by checking the keep password check box. If this checked, you can enter a timeout value in the text field below it. This is the amount of time, in minutes, that the password will be remembered. The default is not to remember passwords. Internals X authentication The program you execute will run under the root user id and will generally have no authority to access your X display. &tdesu; gets around this by adding an authentication cookie for your display to a temporary .Xauthority file. After the command exits, this file is removed. If you don't use X cookies, you are on your own. &tdesu; will detect this and will not add a cookie but you will have to make sure that root is allowed to access to your display. Interface to <command>su</command> &tdesu; uses the sytem's su for acquiring priviliges. In this section, I explain the details of how &tdesu; does this. Because some su implementations (&ie; the one from &RedHat;) don't want to read the password from stdin, &tdesu; creates a pty/tty pair and executes su with it's standard filedescriptors connected to the tty. To execute the command the user selected, rather than an interactive shell, &tdesu; uses the argument with su. This argument is understood by every shell that I know of so it should work portably. su passes this argument to the target user's shell, and the shell executes the program. Example command: su . Instead of executing the user command directly with su, &tdesu; executes a little stub program called tdesu_stub. This stub (running as the target user), requests some information from &tdesu; over the pty/tty channel (the stub's stdin and stdout) and then executes the user's program. The information passed over is: the X display, an X authentication cookie (if available), the PATH and the command to run. The reason why a stub program is used is that the X cookie is private information and therefore cannot be passed on the command line. Password Checking &tdesu; will check the password you entered and gives an error message if it is not correct. The checking is done by executing a test program: /bin/true. If this succeeds, the password is assumed to be correct. Password Keeping For your comfort, &tdesu; implements a keep password feature. If you are interested in security, you should read this paragraph. Allowing &tdesu; to remember passwords opens up a (small) security hole in your system. Obviously, &tdesu; does not allow anybody but your user id to use the passwords, but, if done without caution, this would lower root's security level to that of a normal user (you). A hacker who breaks into your account, would get root access. &tdesu; tries to prevent this. The security scheme it uses is, in my opinion at least, reasonably safe and is explained here. &tdesu; uses a daemon, called tdesud. The daemon listens to a &UNIX; socket in /tmp for commands. The mode of the socket is 0600 so that only your user id can connect to it. If password keeping is enabled, &tdesu; executes commands through this daemon. It writes the command and root's password to the socket and the daemon executes the command using su, as describe before. After this, the command and the password are not thrown away. Instead, they are kept for a specified amount of time. This is the timeout value from in the control module. If another request for the same command is coming within this time period, the client does not have to supply the password. To keep hackers who broke into your account from stealing passwords from the daemon (for example, by attaching a debugger), the daemon is installed set-group-id nogroup. This should prevent all normal users (including you) from getting passwords from the tdesud process. Also, the daemon sets the DISPLAY environment variable to the value it had when it was started. The only thing a hacker can do is execute an application on your display. One weak spot in this scheme is that the programs you execute are probably not written with security in mind (like setuid root programs). This means that they might have buffer overruns or other problems and a hacker could exploit those. The use of the password keeping feature is a tradeoff between security and comfort. I encourage you to think it over and decide for yourself if you want to use it or not. Author &tdesu; Copyright 2000 &Geert.Jansen; &tdesu; is written by &Geert.Jansen;. It is somewhat based on Pietro Iglio's &tdesu;, version 0.3. Pietro and I agreed that I will maintain this program in the future. The author can be reached through email at &Geert.Jansen.mail;. Please report any bugs you find to me so that I can fix them. If you have a suggestion, feel free to contact me. &underFDL; &underArtisticLicense;