Grant full root permissions to an user
Clash Royale CLAN TAG#URR8PPP
up vote
-4
down vote
favorite
In /etc/sudoers
i added:%myuser ALL=(ALL) NOPASSWD:ALL
Now if i type sudo apt update
i don' t need to type the password.
But i want full root permissions: namely, i want to use only apt update
.
The apt is an example i want FULL ROOT PERMISSIONS, another example create/modify files everywhere.
I know that i can log in as root (in some OS), but is not to grant root permissions to an user.
I tried to use the root line (root ALL=(ALL:ALL) ALL
) in the myuser line but nothing:%myuser ALL=(ALL:ALL) ALL
This is my /etc/sudoers
file:
#
# This file MUST be edited with the 'visudo' command as root.
#
# Please consider adding local content in /etc/sudoers.d/ instead of
# directly modifying this file.
#
# See the man page for details on how to write a sudoers file.
#
Defaults env_reset
Defaults mail_badpass
Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin"
# Host alias specification
# User alias specification
# Cmnd alias specification
# User privilege specification
root ALL=(ALL:ALL) ALL
scorpion ALL=(ALL:ALL) ALL
# Members of the admin group may gain root privileges
%admin ALL=(ALL) ALL
# Allow members of group sudo to execute any command
%sudo ALL=(ALL:ALL) ALL
# See sudoers(5) for more information on "#include" directives:
#includedir /etc/sudoers.d
%scorpion ALL=(ALL) NOPASSWD:ALL
I changed the user's UID and GID to 0, but is wrong never do it it will break the user.
Now this is my terminal: I have no name!@my-pc.
I cannot use sudo
or su
. The root user is not allowed to log in in this system. I' m switching to Debian now i' m on Ubuntu.
I already know how to fix it, log in with CTRL+ALT+F1 and root credentials, then set as before UID and GID.
On Debian initially works but after reboot i can' t login. I cannot change the password passwd: myuser 'myuser' does not exist
. So i set as before the UID and GID, i tried to change the password but:
passwd: Authentication token manipulation error
passwd: password unchanged
When i log in i get wrong password.
If is impossible, plan B log in as root but move the /root
(home) folder to the home partitions for easier backup and when change/reinstall a OS to be not formatted.
permissions users root
add a comment |Â
up vote
-4
down vote
favorite
In /etc/sudoers
i added:%myuser ALL=(ALL) NOPASSWD:ALL
Now if i type sudo apt update
i don' t need to type the password.
But i want full root permissions: namely, i want to use only apt update
.
The apt is an example i want FULL ROOT PERMISSIONS, another example create/modify files everywhere.
I know that i can log in as root (in some OS), but is not to grant root permissions to an user.
I tried to use the root line (root ALL=(ALL:ALL) ALL
) in the myuser line but nothing:%myuser ALL=(ALL:ALL) ALL
This is my /etc/sudoers
file:
#
# This file MUST be edited with the 'visudo' command as root.
#
# Please consider adding local content in /etc/sudoers.d/ instead of
# directly modifying this file.
#
# See the man page for details on how to write a sudoers file.
#
Defaults env_reset
Defaults mail_badpass
Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin"
# Host alias specification
# User alias specification
# Cmnd alias specification
# User privilege specification
root ALL=(ALL:ALL) ALL
scorpion ALL=(ALL:ALL) ALL
# Members of the admin group may gain root privileges
%admin ALL=(ALL) ALL
# Allow members of group sudo to execute any command
%sudo ALL=(ALL:ALL) ALL
# See sudoers(5) for more information on "#include" directives:
#includedir /etc/sudoers.d
%scorpion ALL=(ALL) NOPASSWD:ALL
I changed the user's UID and GID to 0, but is wrong never do it it will break the user.
Now this is my terminal: I have no name!@my-pc.
I cannot use sudo
or su
. The root user is not allowed to log in in this system. I' m switching to Debian now i' m on Ubuntu.
I already know how to fix it, log in with CTRL+ALT+F1 and root credentials, then set as before UID and GID.
On Debian initially works but after reboot i can' t login. I cannot change the password passwd: myuser 'myuser' does not exist
. So i set as before the UID and GID, i tried to change the password but:
passwd: Authentication token manipulation error
passwd: password unchanged
When i log in i get wrong password.
If is impossible, plan B log in as root but move the /root
(home) folder to the home partitions for easier backup and when change/reinstall a OS to be not formatted.
permissions users root
When you start a new shell session, you can just typesudo su -
and you will becomeroot
and not have to usesudo
.
â Nasir Riley
Sep 27 at 22:31
It's bad practice to modify the root line in thesudoers
file. Please undo the edit, and see my answer.
â eyoung100
Sep 28 at 2:47
add a comment |Â
up vote
-4
down vote
favorite
up vote
-4
down vote
favorite
In /etc/sudoers
i added:%myuser ALL=(ALL) NOPASSWD:ALL
Now if i type sudo apt update
i don' t need to type the password.
But i want full root permissions: namely, i want to use only apt update
.
The apt is an example i want FULL ROOT PERMISSIONS, another example create/modify files everywhere.
I know that i can log in as root (in some OS), but is not to grant root permissions to an user.
I tried to use the root line (root ALL=(ALL:ALL) ALL
) in the myuser line but nothing:%myuser ALL=(ALL:ALL) ALL
This is my /etc/sudoers
file:
#
# This file MUST be edited with the 'visudo' command as root.
#
# Please consider adding local content in /etc/sudoers.d/ instead of
# directly modifying this file.
#
# See the man page for details on how to write a sudoers file.
#
Defaults env_reset
Defaults mail_badpass
Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin"
# Host alias specification
# User alias specification
# Cmnd alias specification
# User privilege specification
root ALL=(ALL:ALL) ALL
scorpion ALL=(ALL:ALL) ALL
# Members of the admin group may gain root privileges
%admin ALL=(ALL) ALL
# Allow members of group sudo to execute any command
%sudo ALL=(ALL:ALL) ALL
# See sudoers(5) for more information on "#include" directives:
#includedir /etc/sudoers.d
%scorpion ALL=(ALL) NOPASSWD:ALL
I changed the user's UID and GID to 0, but is wrong never do it it will break the user.
Now this is my terminal: I have no name!@my-pc.
I cannot use sudo
or su
. The root user is not allowed to log in in this system. I' m switching to Debian now i' m on Ubuntu.
I already know how to fix it, log in with CTRL+ALT+F1 and root credentials, then set as before UID and GID.
On Debian initially works but after reboot i can' t login. I cannot change the password passwd: myuser 'myuser' does not exist
. So i set as before the UID and GID, i tried to change the password but:
passwd: Authentication token manipulation error
passwd: password unchanged
When i log in i get wrong password.
If is impossible, plan B log in as root but move the /root
(home) folder to the home partitions for easier backup and when change/reinstall a OS to be not formatted.
permissions users root
In /etc/sudoers
i added:%myuser ALL=(ALL) NOPASSWD:ALL
Now if i type sudo apt update
i don' t need to type the password.
But i want full root permissions: namely, i want to use only apt update
.
The apt is an example i want FULL ROOT PERMISSIONS, another example create/modify files everywhere.
I know that i can log in as root (in some OS), but is not to grant root permissions to an user.
I tried to use the root line (root ALL=(ALL:ALL) ALL
) in the myuser line but nothing:%myuser ALL=(ALL:ALL) ALL
This is my /etc/sudoers
file:
#
# This file MUST be edited with the 'visudo' command as root.
#
# Please consider adding local content in /etc/sudoers.d/ instead of
# directly modifying this file.
#
# See the man page for details on how to write a sudoers file.
#
Defaults env_reset
Defaults mail_badpass
Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin"
# Host alias specification
# User alias specification
# Cmnd alias specification
# User privilege specification
root ALL=(ALL:ALL) ALL
scorpion ALL=(ALL:ALL) ALL
# Members of the admin group may gain root privileges
%admin ALL=(ALL) ALL
# Allow members of group sudo to execute any command
%sudo ALL=(ALL:ALL) ALL
# See sudoers(5) for more information on "#include" directives:
#includedir /etc/sudoers.d
%scorpion ALL=(ALL) NOPASSWD:ALL
I changed the user's UID and GID to 0, but is wrong never do it it will break the user.
Now this is my terminal: I have no name!@my-pc.
I cannot use sudo
or su
. The root user is not allowed to log in in this system. I' m switching to Debian now i' m on Ubuntu.
I already know how to fix it, log in with CTRL+ALT+F1 and root credentials, then set as before UID and GID.
On Debian initially works but after reboot i can' t login. I cannot change the password passwd: myuser 'myuser' does not exist
. So i set as before the UID and GID, i tried to change the password but:
passwd: Authentication token manipulation error
passwd: password unchanged
When i log in i get wrong password.
If is impossible, plan B log in as root but move the /root
(home) folder to the home partitions for easier backup and when change/reinstall a OS to be not formatted.
permissions users root
permissions users root
edited Sep 28 at 12:32
asked Sep 27 at 21:49
Scorpion
475
475
When you start a new shell session, you can just typesudo su -
and you will becomeroot
and not have to usesudo
.
â Nasir Riley
Sep 27 at 22:31
It's bad practice to modify the root line in thesudoers
file. Please undo the edit, and see my answer.
â eyoung100
Sep 28 at 2:47
add a comment |Â
When you start a new shell session, you can just typesudo su -
and you will becomeroot
and not have to usesudo
.
â Nasir Riley
Sep 27 at 22:31
It's bad practice to modify the root line in thesudoers
file. Please undo the edit, and see my answer.
â eyoung100
Sep 28 at 2:47
When you start a new shell session, you can just type
sudo su -
and you will become root
and not have to use sudo
.â Nasir Riley
Sep 27 at 22:31
When you start a new shell session, you can just type
sudo su -
and you will become root
and not have to use sudo
.â Nasir Riley
Sep 27 at 22:31
It's bad practice to modify the root line in the
sudoers
file. Please undo the edit, and see my answer.â eyoung100
Sep 28 at 2:47
It's bad practice to modify the root line in the
sudoers
file. Please undo the edit, and see my answer.â eyoung100
Sep 28 at 2:47
add a comment |Â
3 Answers
3
active
oldest
votes
up vote
4
down vote
The more secure way to run apt update
with root
privileges, without typing sudo apt update
, would be to add an alias for apt
to your user's profile:
alias apt='sudo apt'
Then, whenever you run apt update
, or apt upgrade
, or apt install <pkg>
, the apt command will be run with root privileges. But other commands will just run as your normal user, with normal user privileges.
Now, Acknowledging that there are valid reasons why we don't just run all users with root permissions, the following is a way you can give a user all the same permissions as root, that doesn't use sudo.
- Change the user's UID and GID to 0 with
usermod -ou 0 -g 0 <username>
This will change everything your <username>
user does to run with root permissions. Everything.
Yes. I know this is massively insecure. But, it does answer the question.
If you choose this route, please do it on a system you don't mind re-installing from time to time. Running everything as root can end up having unforeseen consequences.
3
Theusermod
suggestion is the permanent solution the OP is asking for, hence the upvote. I will expect another question soon on how to recover the system after an accidental oops.
â Doug O'Neal
Sep 27 at 23:05
Everyone has to learn sometime. When I first started using Linux, I must have reinstalled my system almost daily, from screwing something up. Fixing screwups is really a great way to learn. :)
â Tim Kennedy
Sep 27 at 23:07
2
I have told my staff multiple times that you're not a real sysadmin until you have totally destroyed at least one system, often a production server. :)
â Doug O'Neal
Sep 27 at 23:09
hahaha... that's so true! :D
â Tim Kennedy
Sep 27 at 23:17
I already reinstalled the system some times :) now i ' m gonna try theusermod -ou 0 -g 0 <username>
change only the UID (as told me before) is a bad idea. The apt is an example i want all root permission, so i can create/modify files everywhere.
â Scorpion
Sep 28 at 8:12
 |Â
show 14 more comments
up vote
0
down vote
You can type sudo -i
, then you get an interactive root shell and don't have to type sudo
before each command.
I want a permanent solution.
â Scorpion
Sep 27 at 21:56
Then place that command in the user's.profile
. Or let the user login as root.
â RalfFriedl
Sep 27 at 22:01
How can i let the user login as root?
â Scorpion
Sep 27 at 22:08
I just set a password for root and can login as root. If your distribution disables root login, you should find out how it is done and undo it. Or at least mention what distribution you are using.
â RalfFriedl
Sep 27 at 22:17
Right, but i don' t want to login as root i want the user to become a "second" root.
â Scorpion
Sep 27 at 22:22
 |Â
show 5 more comments
up vote
0
down vote
Using Gentoo's /etc/sudoers
file as a default, you have two options:
Option 1:
## sudoers file.
.. snip ..
## User privilege specification
##
root ALL=(ALL) ALL
## Add your user here. This allows you to run all commands as root,
## not just the update commands.
scorpion ALL=(ALL) ALL
.. snip ..
Option 2:
## sudoers file.
.. snip ..
## User alias specification
##
## Groups of users. These may consist of user names, uids, Unix groups,
## or netgroups.
# User_Alias ADMINS = millert, dowdy, mikef
User_Alias UPDATERS = scorpion
##
## Cmnd alias specification
##
## Groups of commands. Often used to group related commands together.
# Cmnd_Alias PROCESSES = /usr/bin/nice, /bin/kill, /usr/bin/renice,
# /usr/bin/pkill, /usr/bin/top
# Cmnd_Alias REBOOT = /sbin/halt, /sbin/reboot, /sbin/poweroff
Cmnd_Alias UPDATE = /path/to/apt-get, /path/to/apt
.. snip ..
##
## User privilege specification
##
root ALL=(ALL) ALL
UPDATERS ALL=NOPASSWD: UPDATE
Notes
- This example assumes your username is
scorpion
. - I assume the path to all the
apt
commands are in/sbin
but Gentoo doesn't useapt
orapt-get
so don't forget to edit. - This can be done without adding Command Aliases, and User Aliases, but IMHO, the aliases make it easier to add commands, and to debug if needed.
Option is not working is similar to use the root line for my user. Option 2 is for apt only right? i want to grant full root permissions not only apt.
â Scorpion
Sep 28 at 9:03
If you want full permission everywhere then add your user to thesudo
group, aka wheel, and remove the comment on the line starting %sudo ALL = ALL... with the nopasswd option. It may read %wheel. You cannot do what your asking, as sudo sets the proper permissions bit, and the UID/GID of 0 should always belong to root as @TimKennedy pointed out.
â eyoung100
Sep 28 at 9:41
Could you clarify? Yes UID and GID should belong to root, but Tim has only said "Yes. I know this is massively insecure" the problem is that it doens' t work, it will break the user. I removed the comment now i can' t use sudo. Can you post the right configuration?
â Scorpion
Sep 28 at 10:24
i can' t tag you any can you post the right configuration?
â Scorpion
Oct 2 at 21:17
Follow @TimKennedy's answer, and set your UID and GID to zero, thereby replacing the root user with your user. The reason it's "massively insecure" is because you have removed all safety measures. See What's wrong with always being root? Before I can advise you on the proper configuration, should you decide against Tim's answer I need to know what distribution you're using.
â eyoung100
2 days ago
 |Â
show 4 more comments
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
4
down vote
The more secure way to run apt update
with root
privileges, without typing sudo apt update
, would be to add an alias for apt
to your user's profile:
alias apt='sudo apt'
Then, whenever you run apt update
, or apt upgrade
, or apt install <pkg>
, the apt command will be run with root privileges. But other commands will just run as your normal user, with normal user privileges.
Now, Acknowledging that there are valid reasons why we don't just run all users with root permissions, the following is a way you can give a user all the same permissions as root, that doesn't use sudo.
- Change the user's UID and GID to 0 with
usermod -ou 0 -g 0 <username>
This will change everything your <username>
user does to run with root permissions. Everything.
Yes. I know this is massively insecure. But, it does answer the question.
If you choose this route, please do it on a system you don't mind re-installing from time to time. Running everything as root can end up having unforeseen consequences.
3
Theusermod
suggestion is the permanent solution the OP is asking for, hence the upvote. I will expect another question soon on how to recover the system after an accidental oops.
â Doug O'Neal
Sep 27 at 23:05
Everyone has to learn sometime. When I first started using Linux, I must have reinstalled my system almost daily, from screwing something up. Fixing screwups is really a great way to learn. :)
â Tim Kennedy
Sep 27 at 23:07
2
I have told my staff multiple times that you're not a real sysadmin until you have totally destroyed at least one system, often a production server. :)
â Doug O'Neal
Sep 27 at 23:09
hahaha... that's so true! :D
â Tim Kennedy
Sep 27 at 23:17
I already reinstalled the system some times :) now i ' m gonna try theusermod -ou 0 -g 0 <username>
change only the UID (as told me before) is a bad idea. The apt is an example i want all root permission, so i can create/modify files everywhere.
â Scorpion
Sep 28 at 8:12
 |Â
show 14 more comments
up vote
4
down vote
The more secure way to run apt update
with root
privileges, without typing sudo apt update
, would be to add an alias for apt
to your user's profile:
alias apt='sudo apt'
Then, whenever you run apt update
, or apt upgrade
, or apt install <pkg>
, the apt command will be run with root privileges. But other commands will just run as your normal user, with normal user privileges.
Now, Acknowledging that there are valid reasons why we don't just run all users with root permissions, the following is a way you can give a user all the same permissions as root, that doesn't use sudo.
- Change the user's UID and GID to 0 with
usermod -ou 0 -g 0 <username>
This will change everything your <username>
user does to run with root permissions. Everything.
Yes. I know this is massively insecure. But, it does answer the question.
If you choose this route, please do it on a system you don't mind re-installing from time to time. Running everything as root can end up having unforeseen consequences.
3
Theusermod
suggestion is the permanent solution the OP is asking for, hence the upvote. I will expect another question soon on how to recover the system after an accidental oops.
â Doug O'Neal
Sep 27 at 23:05
Everyone has to learn sometime. When I first started using Linux, I must have reinstalled my system almost daily, from screwing something up. Fixing screwups is really a great way to learn. :)
â Tim Kennedy
Sep 27 at 23:07
2
I have told my staff multiple times that you're not a real sysadmin until you have totally destroyed at least one system, often a production server. :)
â Doug O'Neal
Sep 27 at 23:09
hahaha... that's so true! :D
â Tim Kennedy
Sep 27 at 23:17
I already reinstalled the system some times :) now i ' m gonna try theusermod -ou 0 -g 0 <username>
change only the UID (as told me before) is a bad idea. The apt is an example i want all root permission, so i can create/modify files everywhere.
â Scorpion
Sep 28 at 8:12
 |Â
show 14 more comments
up vote
4
down vote
up vote
4
down vote
The more secure way to run apt update
with root
privileges, without typing sudo apt update
, would be to add an alias for apt
to your user's profile:
alias apt='sudo apt'
Then, whenever you run apt update
, or apt upgrade
, or apt install <pkg>
, the apt command will be run with root privileges. But other commands will just run as your normal user, with normal user privileges.
Now, Acknowledging that there are valid reasons why we don't just run all users with root permissions, the following is a way you can give a user all the same permissions as root, that doesn't use sudo.
- Change the user's UID and GID to 0 with
usermod -ou 0 -g 0 <username>
This will change everything your <username>
user does to run with root permissions. Everything.
Yes. I know this is massively insecure. But, it does answer the question.
If you choose this route, please do it on a system you don't mind re-installing from time to time. Running everything as root can end up having unforeseen consequences.
The more secure way to run apt update
with root
privileges, without typing sudo apt update
, would be to add an alias for apt
to your user's profile:
alias apt='sudo apt'
Then, whenever you run apt update
, or apt upgrade
, or apt install <pkg>
, the apt command will be run with root privileges. But other commands will just run as your normal user, with normal user privileges.
Now, Acknowledging that there are valid reasons why we don't just run all users with root permissions, the following is a way you can give a user all the same permissions as root, that doesn't use sudo.
- Change the user's UID and GID to 0 with
usermod -ou 0 -g 0 <username>
This will change everything your <username>
user does to run with root permissions. Everything.
Yes. I know this is massively insecure. But, it does answer the question.
If you choose this route, please do it on a system you don't mind re-installing from time to time. Running everything as root can end up having unforeseen consequences.
answered Sep 27 at 23:03
Tim Kennedy
13.8k22949
13.8k22949
3
Theusermod
suggestion is the permanent solution the OP is asking for, hence the upvote. I will expect another question soon on how to recover the system after an accidental oops.
â Doug O'Neal
Sep 27 at 23:05
Everyone has to learn sometime. When I first started using Linux, I must have reinstalled my system almost daily, from screwing something up. Fixing screwups is really a great way to learn. :)
â Tim Kennedy
Sep 27 at 23:07
2
I have told my staff multiple times that you're not a real sysadmin until you have totally destroyed at least one system, often a production server. :)
â Doug O'Neal
Sep 27 at 23:09
hahaha... that's so true! :D
â Tim Kennedy
Sep 27 at 23:17
I already reinstalled the system some times :) now i ' m gonna try theusermod -ou 0 -g 0 <username>
change only the UID (as told me before) is a bad idea. The apt is an example i want all root permission, so i can create/modify files everywhere.
â Scorpion
Sep 28 at 8:12
 |Â
show 14 more comments
3
Theusermod
suggestion is the permanent solution the OP is asking for, hence the upvote. I will expect another question soon on how to recover the system after an accidental oops.
â Doug O'Neal
Sep 27 at 23:05
Everyone has to learn sometime. When I first started using Linux, I must have reinstalled my system almost daily, from screwing something up. Fixing screwups is really a great way to learn. :)
â Tim Kennedy
Sep 27 at 23:07
2
I have told my staff multiple times that you're not a real sysadmin until you have totally destroyed at least one system, often a production server. :)
â Doug O'Neal
Sep 27 at 23:09
hahaha... that's so true! :D
â Tim Kennedy
Sep 27 at 23:17
I already reinstalled the system some times :) now i ' m gonna try theusermod -ou 0 -g 0 <username>
change only the UID (as told me before) is a bad idea. The apt is an example i want all root permission, so i can create/modify files everywhere.
â Scorpion
Sep 28 at 8:12
3
3
The
usermod
suggestion is the permanent solution the OP is asking for, hence the upvote. I will expect another question soon on how to recover the system after an accidental oops.â Doug O'Neal
Sep 27 at 23:05
The
usermod
suggestion is the permanent solution the OP is asking for, hence the upvote. I will expect another question soon on how to recover the system after an accidental oops.â Doug O'Neal
Sep 27 at 23:05
Everyone has to learn sometime. When I first started using Linux, I must have reinstalled my system almost daily, from screwing something up. Fixing screwups is really a great way to learn. :)
â Tim Kennedy
Sep 27 at 23:07
Everyone has to learn sometime. When I first started using Linux, I must have reinstalled my system almost daily, from screwing something up. Fixing screwups is really a great way to learn. :)
â Tim Kennedy
Sep 27 at 23:07
2
2
I have told my staff multiple times that you're not a real sysadmin until you have totally destroyed at least one system, often a production server. :)
â Doug O'Neal
Sep 27 at 23:09
I have told my staff multiple times that you're not a real sysadmin until you have totally destroyed at least one system, often a production server. :)
â Doug O'Neal
Sep 27 at 23:09
hahaha... that's so true! :D
â Tim Kennedy
Sep 27 at 23:17
hahaha... that's so true! :D
â Tim Kennedy
Sep 27 at 23:17
I already reinstalled the system some times :) now i ' m gonna try the
usermod -ou 0 -g 0 <username>
change only the UID (as told me before) is a bad idea. The apt is an example i want all root permission, so i can create/modify files everywhere.â Scorpion
Sep 28 at 8:12
I already reinstalled the system some times :) now i ' m gonna try the
usermod -ou 0 -g 0 <username>
change only the UID (as told me before) is a bad idea. The apt is an example i want all root permission, so i can create/modify files everywhere.â Scorpion
Sep 28 at 8:12
 |Â
show 14 more comments
up vote
0
down vote
You can type sudo -i
, then you get an interactive root shell and don't have to type sudo
before each command.
I want a permanent solution.
â Scorpion
Sep 27 at 21:56
Then place that command in the user's.profile
. Or let the user login as root.
â RalfFriedl
Sep 27 at 22:01
How can i let the user login as root?
â Scorpion
Sep 27 at 22:08
I just set a password for root and can login as root. If your distribution disables root login, you should find out how it is done and undo it. Or at least mention what distribution you are using.
â RalfFriedl
Sep 27 at 22:17
Right, but i don' t want to login as root i want the user to become a "second" root.
â Scorpion
Sep 27 at 22:22
 |Â
show 5 more comments
up vote
0
down vote
You can type sudo -i
, then you get an interactive root shell and don't have to type sudo
before each command.
I want a permanent solution.
â Scorpion
Sep 27 at 21:56
Then place that command in the user's.profile
. Or let the user login as root.
â RalfFriedl
Sep 27 at 22:01
How can i let the user login as root?
â Scorpion
Sep 27 at 22:08
I just set a password for root and can login as root. If your distribution disables root login, you should find out how it is done and undo it. Or at least mention what distribution you are using.
â RalfFriedl
Sep 27 at 22:17
Right, but i don' t want to login as root i want the user to become a "second" root.
â Scorpion
Sep 27 at 22:22
 |Â
show 5 more comments
up vote
0
down vote
up vote
0
down vote
You can type sudo -i
, then you get an interactive root shell and don't have to type sudo
before each command.
You can type sudo -i
, then you get an interactive root shell and don't have to type sudo
before each command.
answered Sep 27 at 21:54
RalfFriedl
4,2481725
4,2481725
I want a permanent solution.
â Scorpion
Sep 27 at 21:56
Then place that command in the user's.profile
. Or let the user login as root.
â RalfFriedl
Sep 27 at 22:01
How can i let the user login as root?
â Scorpion
Sep 27 at 22:08
I just set a password for root and can login as root. If your distribution disables root login, you should find out how it is done and undo it. Or at least mention what distribution you are using.
â RalfFriedl
Sep 27 at 22:17
Right, but i don' t want to login as root i want the user to become a "second" root.
â Scorpion
Sep 27 at 22:22
 |Â
show 5 more comments
I want a permanent solution.
â Scorpion
Sep 27 at 21:56
Then place that command in the user's.profile
. Or let the user login as root.
â RalfFriedl
Sep 27 at 22:01
How can i let the user login as root?
â Scorpion
Sep 27 at 22:08
I just set a password for root and can login as root. If your distribution disables root login, you should find out how it is done and undo it. Or at least mention what distribution you are using.
â RalfFriedl
Sep 27 at 22:17
Right, but i don' t want to login as root i want the user to become a "second" root.
â Scorpion
Sep 27 at 22:22
I want a permanent solution.
â Scorpion
Sep 27 at 21:56
I want a permanent solution.
â Scorpion
Sep 27 at 21:56
Then place that command in the user's
.profile
. Or let the user login as root.â RalfFriedl
Sep 27 at 22:01
Then place that command in the user's
.profile
. Or let the user login as root.â RalfFriedl
Sep 27 at 22:01
How can i let the user login as root?
â Scorpion
Sep 27 at 22:08
How can i let the user login as root?
â Scorpion
Sep 27 at 22:08
I just set a password for root and can login as root. If your distribution disables root login, you should find out how it is done and undo it. Or at least mention what distribution you are using.
â RalfFriedl
Sep 27 at 22:17
I just set a password for root and can login as root. If your distribution disables root login, you should find out how it is done and undo it. Or at least mention what distribution you are using.
â RalfFriedl
Sep 27 at 22:17
Right, but i don' t want to login as root i want the user to become a "second" root.
â Scorpion
Sep 27 at 22:22
Right, but i don' t want to login as root i want the user to become a "second" root.
â Scorpion
Sep 27 at 22:22
 |Â
show 5 more comments
up vote
0
down vote
Using Gentoo's /etc/sudoers
file as a default, you have two options:
Option 1:
## sudoers file.
.. snip ..
## User privilege specification
##
root ALL=(ALL) ALL
## Add your user here. This allows you to run all commands as root,
## not just the update commands.
scorpion ALL=(ALL) ALL
.. snip ..
Option 2:
## sudoers file.
.. snip ..
## User alias specification
##
## Groups of users. These may consist of user names, uids, Unix groups,
## or netgroups.
# User_Alias ADMINS = millert, dowdy, mikef
User_Alias UPDATERS = scorpion
##
## Cmnd alias specification
##
## Groups of commands. Often used to group related commands together.
# Cmnd_Alias PROCESSES = /usr/bin/nice, /bin/kill, /usr/bin/renice,
# /usr/bin/pkill, /usr/bin/top
# Cmnd_Alias REBOOT = /sbin/halt, /sbin/reboot, /sbin/poweroff
Cmnd_Alias UPDATE = /path/to/apt-get, /path/to/apt
.. snip ..
##
## User privilege specification
##
root ALL=(ALL) ALL
UPDATERS ALL=NOPASSWD: UPDATE
Notes
- This example assumes your username is
scorpion
. - I assume the path to all the
apt
commands are in/sbin
but Gentoo doesn't useapt
orapt-get
so don't forget to edit. - This can be done without adding Command Aliases, and User Aliases, but IMHO, the aliases make it easier to add commands, and to debug if needed.
Option is not working is similar to use the root line for my user. Option 2 is for apt only right? i want to grant full root permissions not only apt.
â Scorpion
Sep 28 at 9:03
If you want full permission everywhere then add your user to thesudo
group, aka wheel, and remove the comment on the line starting %sudo ALL = ALL... with the nopasswd option. It may read %wheel. You cannot do what your asking, as sudo sets the proper permissions bit, and the UID/GID of 0 should always belong to root as @TimKennedy pointed out.
â eyoung100
Sep 28 at 9:41
Could you clarify? Yes UID and GID should belong to root, but Tim has only said "Yes. I know this is massively insecure" the problem is that it doens' t work, it will break the user. I removed the comment now i can' t use sudo. Can you post the right configuration?
â Scorpion
Sep 28 at 10:24
i can' t tag you any can you post the right configuration?
â Scorpion
Oct 2 at 21:17
Follow @TimKennedy's answer, and set your UID and GID to zero, thereby replacing the root user with your user. The reason it's "massively insecure" is because you have removed all safety measures. See What's wrong with always being root? Before I can advise you on the proper configuration, should you decide against Tim's answer I need to know what distribution you're using.
â eyoung100
2 days ago
 |Â
show 4 more comments
up vote
0
down vote
Using Gentoo's /etc/sudoers
file as a default, you have two options:
Option 1:
## sudoers file.
.. snip ..
## User privilege specification
##
root ALL=(ALL) ALL
## Add your user here. This allows you to run all commands as root,
## not just the update commands.
scorpion ALL=(ALL) ALL
.. snip ..
Option 2:
## sudoers file.
.. snip ..
## User alias specification
##
## Groups of users. These may consist of user names, uids, Unix groups,
## or netgroups.
# User_Alias ADMINS = millert, dowdy, mikef
User_Alias UPDATERS = scorpion
##
## Cmnd alias specification
##
## Groups of commands. Often used to group related commands together.
# Cmnd_Alias PROCESSES = /usr/bin/nice, /bin/kill, /usr/bin/renice,
# /usr/bin/pkill, /usr/bin/top
# Cmnd_Alias REBOOT = /sbin/halt, /sbin/reboot, /sbin/poweroff
Cmnd_Alias UPDATE = /path/to/apt-get, /path/to/apt
.. snip ..
##
## User privilege specification
##
root ALL=(ALL) ALL
UPDATERS ALL=NOPASSWD: UPDATE
Notes
- This example assumes your username is
scorpion
. - I assume the path to all the
apt
commands are in/sbin
but Gentoo doesn't useapt
orapt-get
so don't forget to edit. - This can be done without adding Command Aliases, and User Aliases, but IMHO, the aliases make it easier to add commands, and to debug if needed.
Option is not working is similar to use the root line for my user. Option 2 is for apt only right? i want to grant full root permissions not only apt.
â Scorpion
Sep 28 at 9:03
If you want full permission everywhere then add your user to thesudo
group, aka wheel, and remove the comment on the line starting %sudo ALL = ALL... with the nopasswd option. It may read %wheel. You cannot do what your asking, as sudo sets the proper permissions bit, and the UID/GID of 0 should always belong to root as @TimKennedy pointed out.
â eyoung100
Sep 28 at 9:41
Could you clarify? Yes UID and GID should belong to root, but Tim has only said "Yes. I know this is massively insecure" the problem is that it doens' t work, it will break the user. I removed the comment now i can' t use sudo. Can you post the right configuration?
â Scorpion
Sep 28 at 10:24
i can' t tag you any can you post the right configuration?
â Scorpion
Oct 2 at 21:17
Follow @TimKennedy's answer, and set your UID and GID to zero, thereby replacing the root user with your user. The reason it's "massively insecure" is because you have removed all safety measures. See What's wrong with always being root? Before I can advise you on the proper configuration, should you decide against Tim's answer I need to know what distribution you're using.
â eyoung100
2 days ago
 |Â
show 4 more comments
up vote
0
down vote
up vote
0
down vote
Using Gentoo's /etc/sudoers
file as a default, you have two options:
Option 1:
## sudoers file.
.. snip ..
## User privilege specification
##
root ALL=(ALL) ALL
## Add your user here. This allows you to run all commands as root,
## not just the update commands.
scorpion ALL=(ALL) ALL
.. snip ..
Option 2:
## sudoers file.
.. snip ..
## User alias specification
##
## Groups of users. These may consist of user names, uids, Unix groups,
## or netgroups.
# User_Alias ADMINS = millert, dowdy, mikef
User_Alias UPDATERS = scorpion
##
## Cmnd alias specification
##
## Groups of commands. Often used to group related commands together.
# Cmnd_Alias PROCESSES = /usr/bin/nice, /bin/kill, /usr/bin/renice,
# /usr/bin/pkill, /usr/bin/top
# Cmnd_Alias REBOOT = /sbin/halt, /sbin/reboot, /sbin/poweroff
Cmnd_Alias UPDATE = /path/to/apt-get, /path/to/apt
.. snip ..
##
## User privilege specification
##
root ALL=(ALL) ALL
UPDATERS ALL=NOPASSWD: UPDATE
Notes
- This example assumes your username is
scorpion
. - I assume the path to all the
apt
commands are in/sbin
but Gentoo doesn't useapt
orapt-get
so don't forget to edit. - This can be done without adding Command Aliases, and User Aliases, but IMHO, the aliases make it easier to add commands, and to debug if needed.
Using Gentoo's /etc/sudoers
file as a default, you have two options:
Option 1:
## sudoers file.
.. snip ..
## User privilege specification
##
root ALL=(ALL) ALL
## Add your user here. This allows you to run all commands as root,
## not just the update commands.
scorpion ALL=(ALL) ALL
.. snip ..
Option 2:
## sudoers file.
.. snip ..
## User alias specification
##
## Groups of users. These may consist of user names, uids, Unix groups,
## or netgroups.
# User_Alias ADMINS = millert, dowdy, mikef
User_Alias UPDATERS = scorpion
##
## Cmnd alias specification
##
## Groups of commands. Often used to group related commands together.
# Cmnd_Alias PROCESSES = /usr/bin/nice, /bin/kill, /usr/bin/renice,
# /usr/bin/pkill, /usr/bin/top
# Cmnd_Alias REBOOT = /sbin/halt, /sbin/reboot, /sbin/poweroff
Cmnd_Alias UPDATE = /path/to/apt-get, /path/to/apt
.. snip ..
##
## User privilege specification
##
root ALL=(ALL) ALL
UPDATERS ALL=NOPASSWD: UPDATE
Notes
- This example assumes your username is
scorpion
. - I assume the path to all the
apt
commands are in/sbin
but Gentoo doesn't useapt
orapt-get
so don't forget to edit. - This can be done without adding Command Aliases, and User Aliases, but IMHO, the aliases make it easier to add commands, and to debug if needed.
answered Sep 28 at 3:27
eyoung100
4,6951441
4,6951441
Option is not working is similar to use the root line for my user. Option 2 is for apt only right? i want to grant full root permissions not only apt.
â Scorpion
Sep 28 at 9:03
If you want full permission everywhere then add your user to thesudo
group, aka wheel, and remove the comment on the line starting %sudo ALL = ALL... with the nopasswd option. It may read %wheel. You cannot do what your asking, as sudo sets the proper permissions bit, and the UID/GID of 0 should always belong to root as @TimKennedy pointed out.
â eyoung100
Sep 28 at 9:41
Could you clarify? Yes UID and GID should belong to root, but Tim has only said "Yes. I know this is massively insecure" the problem is that it doens' t work, it will break the user. I removed the comment now i can' t use sudo. Can you post the right configuration?
â Scorpion
Sep 28 at 10:24
i can' t tag you any can you post the right configuration?
â Scorpion
Oct 2 at 21:17
Follow @TimKennedy's answer, and set your UID and GID to zero, thereby replacing the root user with your user. The reason it's "massively insecure" is because you have removed all safety measures. See What's wrong with always being root? Before I can advise you on the proper configuration, should you decide against Tim's answer I need to know what distribution you're using.
â eyoung100
2 days ago
 |Â
show 4 more comments
Option is not working is similar to use the root line for my user. Option 2 is for apt only right? i want to grant full root permissions not only apt.
â Scorpion
Sep 28 at 9:03
If you want full permission everywhere then add your user to thesudo
group, aka wheel, and remove the comment on the line starting %sudo ALL = ALL... with the nopasswd option. It may read %wheel. You cannot do what your asking, as sudo sets the proper permissions bit, and the UID/GID of 0 should always belong to root as @TimKennedy pointed out.
â eyoung100
Sep 28 at 9:41
Could you clarify? Yes UID and GID should belong to root, but Tim has only said "Yes. I know this is massively insecure" the problem is that it doens' t work, it will break the user. I removed the comment now i can' t use sudo. Can you post the right configuration?
â Scorpion
Sep 28 at 10:24
i can' t tag you any can you post the right configuration?
â Scorpion
Oct 2 at 21:17
Follow @TimKennedy's answer, and set your UID and GID to zero, thereby replacing the root user with your user. The reason it's "massively insecure" is because you have removed all safety measures. See What's wrong with always being root? Before I can advise you on the proper configuration, should you decide against Tim's answer I need to know what distribution you're using.
â eyoung100
2 days ago
Option is not working is similar to use the root line for my user. Option 2 is for apt only right? i want to grant full root permissions not only apt.
â Scorpion
Sep 28 at 9:03
Option is not working is similar to use the root line for my user. Option 2 is for apt only right? i want to grant full root permissions not only apt.
â Scorpion
Sep 28 at 9:03
If you want full permission everywhere then add your user to the
sudo
group, aka wheel, and remove the comment on the line starting %sudo ALL = ALL... with the nopasswd option. It may read %wheel. You cannot do what your asking, as sudo sets the proper permissions bit, and the UID/GID of 0 should always belong to root as @TimKennedy pointed out.â eyoung100
Sep 28 at 9:41
If you want full permission everywhere then add your user to the
sudo
group, aka wheel, and remove the comment on the line starting %sudo ALL = ALL... with the nopasswd option. It may read %wheel. You cannot do what your asking, as sudo sets the proper permissions bit, and the UID/GID of 0 should always belong to root as @TimKennedy pointed out.â eyoung100
Sep 28 at 9:41
Could you clarify? Yes UID and GID should belong to root, but Tim has only said "Yes. I know this is massively insecure" the problem is that it doens' t work, it will break the user. I removed the comment now i can' t use sudo. Can you post the right configuration?
â Scorpion
Sep 28 at 10:24
Could you clarify? Yes UID and GID should belong to root, but Tim has only said "Yes. I know this is massively insecure" the problem is that it doens' t work, it will break the user. I removed the comment now i can' t use sudo. Can you post the right configuration?
â Scorpion
Sep 28 at 10:24
i can' t tag you any can you post the right configuration?
â Scorpion
Oct 2 at 21:17
i can' t tag you any can you post the right configuration?
â Scorpion
Oct 2 at 21:17
Follow @TimKennedy's answer, and set your UID and GID to zero, thereby replacing the root user with your user. The reason it's "massively insecure" is because you have removed all safety measures. See What's wrong with always being root? Before I can advise you on the proper configuration, should you decide against Tim's answer I need to know what distribution you're using.
â eyoung100
2 days ago
Follow @TimKennedy's answer, and set your UID and GID to zero, thereby replacing the root user with your user. The reason it's "massively insecure" is because you have removed all safety measures. See What's wrong with always being root? Before I can advise you on the proper configuration, should you decide against Tim's answer I need to know what distribution you're using.
â eyoung100
2 days ago
 |Â
show 4 more comments
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f471946%2fgrant-full-root-permissions-to-an-user%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
When you start a new shell session, you can just type
sudo su -
and you will becomeroot
and not have to usesudo
.â Nasir Riley
Sep 27 at 22:31
It's bad practice to modify the root line in the
sudoers
file. Please undo the edit, and see my answer.â eyoung100
Sep 28 at 2:47