My user account doesnt have sudo despite being in sudoers. I cant run new commands i have to execute the binary. Grub takes very long to load with “welcome to grub” message. I just wanted a stable distro as arch broke and currupted my external ssd

  • freddy@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    9
    ·
    1 year ago

    why do you want to use sudo? As normal user you can run most of commands. If you are the only one user do not need sudo, use “su” instead with the admin password.

    • tony@lemmy.hoyle.me.uk
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      It’s bad practice to stay in a root shell because it’s easy to screw up and break something. That’s why sudo exists… you only run something privileged if it absolutely has to.

      • tal@lemmy.today
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        1 year ago

        You also have sudo -s, which is similar to su.

        Some distros set up sudo by default, and some don’t. I started out on Red Hat, back in the 1990s, and I don’t believe that they set up sudo by default; the norm there, at least at the time, was to su. Ubuntu, as I recall, installs sudo and I believe configures it to grant sudo access to the user account who did the installation. There, the convention is to kinda sudo. I can’t recall whether the default is passwordless, though.

        I don’t think that using either is a horrendously bad practice. I tend to set up sudo in password-requiring mode and use sudo these days, but I wouldn’t blink an eye at using su either.

        I think that the most-significant security concern with su is that you can leave a root shell lying around if you walk away from your computer, and while sudo may reduce the frequency with which that happens – if one is prone to walking away from their computer and leaving it unlocked in the first place – you can do that with sudo -s as well, which I certainly use, so…shrugs Plus, if you have sudo set up with passwordless root access, any shell is functionally a root shell anyway. And, frankly, if someone has physical access to a system, most people don’t bother to lock down their system against setting init=/bin/sh on the kernel command line in GRUB, passwording their BIOS and restricting it from booting from alternate boot media, etc, so…

      • freddy@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        1 year ago

        I am not a sysadmin, jus user since 2000. I think if you ever need to do something with sudo it will be as dangerous as using su.