Ubuntu is switching its default sudo
implementation to a memory-safe version written in Rust. This change, starting with Ubuntu 23.10 "Mantic Minotaur", significantly improves security by mitigating vulnerabilities related to memory corruption, such as buffer overflows and use-after-free bugs, which are common targets for exploits. This Rust-based sudo
is developed and maintained by the OpenSSF's Secure Software Supply Chain project, and represents a major step towards a more secure foundation for the widely-used system administration tool.
The blog post "Right to root access" argues that users should have complete control over the devices they own, including root access. It contends that manufacturers artificially restrict user access for anti-competitive reasons, forcing users into walled gardens and limiting their ability to repair, modify, and truly own their devices. This restriction extends beyond just software to encompass firmware and hardware, hindering innovation and consumer freedom. The author believes this control should be a fundamental digital right, akin to property rights in the physical world, empowering users to fully utilize and customize their technology.
HN users largely agree with the premise that users should have root access to devices they own. Several express frustration with "walled gardens" and the increasing trend of manufacturers restricting user control. Some highlight the security and repairability benefits of root access, citing examples like jailbreaking iPhones to enable security features unavailable in the official iOS. A few more skeptical comments raise concerns about users bricking their devices and the potential for increased malware susceptibility if users lack technical expertise. Others note the conflict between right-to-repair legislation and software licensing agreements. A recurring theme is the desire for modular devices that allow component replacement and OS customization without voiding warranties.
Summary of Comments ( 69 )
https://news.ycombinator.com/item?id=43903853
Hacker News commenters generally expressed approval for Ubuntu's move to a memory-safe
sudo
, viewing it as a positive step towards improved security. Some questioned the significance of the change, pointing out thatsudo
itself isn't a frequent source of vulnerabilities and suggesting that efforts might be better directed elsewhere. A few expressed concerns about potential performance impacts, while others highlighted the importance of addressing memory safety issues in widely used system utilities likesudo
to mitigate even rare but potentially impactful vulnerabilities. The discussion also touched upon the broader trend of adopting Rust for system programming and the trade-offs between memory safety and performance. Several commenters shared anecdotes about past vulnerabilities related tosudo
and other core utilities, reinforcing the argument for enhanced security measures.The Hacker News post "Memory-safe sudo to become the default in Ubuntu" generated several comments discussing the implications of switching to a memory-safe version of
sudo
.Several commenters expressed strong approval for the move, emphasizing the importance of memory safety in a critical utility like
sudo
. They highlighted howsudo
's privileged position makes it a prime target for exploitation, and how memory safety mitigations can significantly reduce the risk of successful attacks. One commenter specifically mentioned how this change aligns with a broader industry trend towards prioritizing memory safety.Some discussion revolved around the choice of Rust as the language for the rewritten
sudo
. While generally praised for its memory safety features, a few commenters raised concerns about the potential performance overhead and the learning curve for developers accustomed to C. One commenter pointed out that the performance impact is likely negligible for a tool likesudo
, which isn't typically performance-critical. Another countered that while Rust's performance is often comparable to C, achieving optimal performance in Rust can require more effort.A few comments delved into the technical details of the rewrite, including the challenges of integrating Rust code with existing C codebases. One commenter mentioned the use of bindgen to create safe bindings, acknowledging the complexities involved in such integrations.
Several commenters expressed hope that other distributions would follow Ubuntu's lead in adopting a memory-safe
sudo
. The discussion also touched upon the wider adoption of memory-safe languages in system programming, with some suggesting that this move by Ubuntu could signal a significant shift in the industry.A couple of comments inquired about the timeline for the transition and the testing procedures in place to ensure a smooth rollout. There was also a brief discussion about the potential impact on existing scripts and configurations, with one commenter suggesting that the changes are unlikely to cause significant disruption.
Overall, the comments reflect a generally positive reception to the news, with many commenters acknowledging the importance of memory safety in system utilities and praising Ubuntu for taking the lead in this area. While some concerns were raised regarding performance and the learning curve associated with Rust, the overall sentiment leaned towards the long-term benefits of increased security.