<othercredit role="translator"><firstname>John</firstname><surname>Knight</surname><affiliation><address><email>anarchist_tomato@herzeleid.net</email></address></affiliation><contrib>Conversion to British English</contrib></othercredit>
<para>Welcome to &tdesu;! &tdesu; is a graphical front end for the &UNIX; <command>su</command> command for the K Desktop Environment. It allows you to run a program as different user by supplying the password for that user. &tdesu; is an unprivileged program; it uses the system's <command>su</command>.</para>
<para>&tdesu; has one additional feature: it can remember passwords for you. If you are using this feature, you only need to enter the password once for each command. See <xref linkend="sec-password-keeping"/> for more information on this and a security analysis.</para>
<para>This program is meant to be started from the command line or from <filename>.desktop</filename> files. Although it asks for the <systemitem class="username">root</systemitem> password using a &GUI; dialogue, I consider it to be more of a command line <-> &GUI; glue instead of a pure &GUI; program.</para>
<listitem><para>This specifies the program to run as root. It has to be passed in one argument. So if, for example, you want to start a new file manager, you would enter at the prompt: <userinput><command>tdesu <option>-c <replaceable>kfm -sw</replaceable></option></command></userinput></para></listitem>
<listitem><para>This option allow efficient use of &tdesu; in <filename>.desktop</filename> files. It tells &tdesu; to examine the file specified by <parameter>FILE</parameter>. If this file is writable by the current user, &tdesu; will execute the command as the current user. If it is not writable, the command is executed as user <parameter>USER</parameter> (defaults to root).</para>
<para><parameter>FILE</parameter> is evaluated like this: if <parameter>FILE</parameter> starts with a <literal>/</literal>, it is taken as an absolute filename. Otherwise, it is taken as the name of a global &kde; configuration file. For example: to configure the K display manager, <application>tdm</application>, you could issue <command>tdesu <option>-c tdmconfig -f tdmrc</option></command></para></listitem>
<listitem><para>Enable terminal output. This disables password keeping. This is largely for debugging purposes; if you want to run a console mode app, use the standard <command>su</command> instead.</para> </listitem>
<para>&tdesu; comes with a control module named <application>kcmtdesu</application>. You can find it in the <guimenu>K</guimenu> menu under <menuchoice><guisubmenu>Settings</guisubmenu> <guisubmenu>Applications</guisubmenu> <guimenuitem>KDE su</guimenuitem></menuchoice>. You can change the following things:</para>
<listitem><para>This is how characters you type are echoed to the screen. Possible choices are: one star per character, three stars or no echo at all. The default is one star per character.</para></listitem>
<listitem><para>You can instruct &tdesu; remember passwords you enter by checking the <guilabel>keep password</guilabel> check box. If this checked, you can enter a timeout value in the text field below it. This is the amount of time, in minutes, that the password will be remembered. The default is not to remember passwords.</para></listitem>
<para>The program you execute will run under the root user id and will generally have no authority to access your X display. &tdesu; gets around this by adding an authentication cookie for your display to a temporary <filename>.Xauthority</filename> file. After the command exits, this file is removed. </para>
<para>If you don't use X cookies, you are on your own. &tdesu; will detect this and will not add a cookie but you will have to make sure that root is allowed to access to your display.</para>
<para>&tdesu; uses the sytem's <command>su</command> for acquiring priviliges. In this section, I explain the details of how &tdesu; does this. </para>
<para>Because some <command>su</command> implementations (&ie; the one from &RedHat;) don't want to read the password from <literal>stdin</literal>, &tdesu; creates a pty/tty pair and executes <command>su</command> with it's standard filedescriptors connected to the tty.</para>
<para>To execute the command the user selected, rather than an interactive shell, &tdesu; uses the <option>-c</option> argument with <command>su</command>. This argument is understood by every shell that I know of so it should work portably. <command>su</command> passes this <option>-c</option> argument to the target user's shell, and the shell executes the program. Example command: <command>su <option>root -c <replaceable>the_program</replaceable></option></command>.</para>
<para>Instead of executing the user command directly with <command>su</command>, &tdesu; executes a little stub program called <application>tdesu_stub</application>. This stub (running as the target user), requests some information from &tdesu; over the pty/tty channel (the stub's stdin and stdout) and then executes the user's program. The information passed over is: the X display, an X authentication cookie (if available), the <envar>PATH</envar> and the command to run. The reason why a stub program is used is that the X cookie is private information and therefore cannot be passed on the command line.</para>
<para>&tdesu; will check the password you entered and gives an error message if it is not correct. The checking is done by executing a test program: <filename>/bin/true</filename>. If this succeeds, the password is assumed to be correct.</para>
<para>For your comfort, &tdesu; implements a <quote>keep password</quote> feature. If you are interested in security, you should read this paragraph.</para>
<para>Allowing &tdesu; to remember passwords opens up a (small) security hole in your system. Obviously, &tdesu; does not allow anybody but your user id to use the passwords, but, if done without caution, this would lower <systemitem class="username">root</systemitem>'s security level to that of a normal user (you). A hacker who breaks into your account, would get <systemitem class="username">root</systemitem> access. &tdesu; tries to prevent this. The security scheme it uses is, in my opinion at least, reasonably safe and is explained here.</para>
<para>&tdesu; uses a daemon, called <application>tdesud</application>. The daemon listens to a &UNIX; socket in <filename>/tmp</filename> for commands. The mode of the socket is 0600 so that only your user id can connect to it. If password keeping is enabled, &tdesu; executes commands through this daemon. It writes the command and <systemitem class="username">root</systemitem>'s password to the socket and the daemon executes the command using <command>su</command>, as describe before. After this, the command and the password are not thrown away. Instead, they are kept for a specified amount of time. This is the timeout value from in the control module. If another request for the same command is coming within this time period, the client does not have to supply the password. To keep hackers who broke into your account from stealing passwords from the daemon (for example, by attaching a debugger), the daemon is installed set-group-id nogroup. This should prevent all normal users (including you) from getting passwords from the <application>tdesud</application> process. Also, the daemon sets the <envar>DISPLAY</envar> environment variable to the value it had when it was started. The only thing a hacker can do is execute an application on your display.</para>
<para>One weak spot in this scheme is that the programs you execute are probably not written with security in mind (like setuid <systemitem class="username">root</systemitem> programs). This means that they might have buffer overruns or other problems and a hacker could exploit those.</para>
<para>The use of the password keeping feature is a tradeoff between security and comfort. I encourage you to think it over and decide for yourself if you want to use it or not.</para>
<para>&tdesu; is written by &Geert.Jansen;. It is somewhat based on Pietro Iglio's &tdesu;, version 0.3. Pietro and I agreed that I will maintain this program in the future.</para>
<para>The author can be reached through email at &Geert.Jansen.mail;. Please report any bugs you find to me so that I can fix them. If you have a suggestion, feel free to contact me.</para>