Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#79231 - [firewalld] Consider adding polkit rule to allow admins to change settings without authenticating
Attached to Project:
Arch Linux
Opened by CYQ (cyq) - Friday, 28 July 2023, 09:53 GMT
Last edited by Maxime Gauduin (Alucryd) - Friday, 28 July 2023, 14:13 GMT
Opened by CYQ (cyq) - Friday, 28 July 2023, 09:53 GMT
Last edited by Maxime Gauduin (Alucryd) - Friday, 28 July 2023, 14:13 GMT
|
DetailsDescription:
In Fedora's `firewalld` package, they've included an additional polkit rule which allows all users in the `wheel` group to change firewalld settings without authenticating with password. This file is installed under `/usr/share/polkit-1/rules.d`. See https://src.fedoraproject.org/rpms/firewalld/blob/rawhide/f/org.fedoraproject.FirewallD1.desktop.rules.choice I feel like this is reasonable rule to include, and it does indeed improve the user experience (especially when using firewalld's GUI). However, I'm also aware of https://dont-ship.it/, which is mostly addressing WIP patches but applies to this somewhat as well. So instead of jumping the gun and claiming that Arch should definitely do what Fedora does, I would like to hear about maintainers' opinion on this first. Do you think it's a good idea to include such a rule? |
This task depends upon
Closed by Maxime Gauduin (Alucryd)
Friday, 28 July 2023, 14:13 GMT
Reason for closing: Won't implement
Friday, 28 July 2023, 14:13 GMT
Reason for closing: Won't implement
Regarding the "user experience" part, `sudo/doas` will only ask for your password once for the first command and won't ask it again until a certain period of inactivity (when using the CLI); and I assume polkit only asks for your password once when opening the GUI, right? (I don't use the GUI myself to be honest). It feels like a big change regarding security for such a little user experience improvement to me.
If anything, I think such `sudo/doas/polkit` permissive rules should be explicitly done by users themself if desired/needed in my opinion.
I'd personally vote "no" to introduce this polkit rule by default, but I'll let Alucryd give their thoughts as well :)