At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.
@astray yeah, that could be an option, but if more users exist in that machine then other processes might fail as that instance is part of a bigger cluster that has several processes running. It might not be a big deal, but checking that may still need some work. I'd prefer a way to do it without creating new users, if it exists
If a different user doesn't exist then you obviously can't run the command as that different user. The only solution here is to create a new user account.
Also your image is improperly configured which is something you should fix first.
There are no other users at all? Seems like a lot of stuff simply wouldn’t work without a single non-root user, not to mention this is a pretty bad security stance considering the only user is the most powerful one.
If you do have another user on the instance you can su as that other user, nobody for example, from the root account. Run ‘cat /etc/passwd’ and you will see every available user on the instance.
@astraeus yep, completely agree on the security issues, that is a mistake that should be fixed. But for the moment I confirmed that root is the only user, and every file and program in the instance can only be used by root (I just created a new user and tried to run the command with su -c but got a lot of permission denials and command not found)
If I could hide or disable my own sudo permissions that would save me a lot of work, but I'm starting to think that something like that doesn't exist 🙁
Unfortunately hiding sudo from root would lead to much greater issues. You can remove sudo privileges from a non-root user, but I don’t think there’s a feasible way to do so for root.
Does your new user have a proper shell setup? If you type bash in the new user’s terminal does it give you anything?
The system is broken. Wipe it and start again. I could imagine a system with no configured root but root only is just a security nightmare and not worth using as a starting point.
I really hope that machine isn't exposed to the internet..
In theory a root application can drop capabilities when it starts up and remain root pid, but it's not that common.. it's used for certain system apps that require root to increase security. It is not a replacement for unprivileged users.
Forgot to mention that creating a new user brings a lot of problems because of how that machine is configured and all the tools that would need to be added the new user's permission. In theory it would eventually work after some time working on it, but I'd like to know if there's a way to do it without creating users (or if it's impossible, so I can just go on with that only option) @linux
@Oisteink in another comment (https://social.vivaldi.net/users/nirogu/statuses/111342629815373353) I explained why I'd prefer not to create another user, as it would require a lot of work to configure everything again for that command to work (it's a big process). I was thinking of hiding my sudo permissions from the program or something like that, if possible, because many things in the instance are only configured to be used with the root user, even if they don't require sudo. Anyway, I'm seeing that it might not be possible so creating a new user could be the only option 🙁
@ursakhiin honestly, didn't consider it. Just checked and the "docker" command doesn't even exist so I assume that is not the case. Do you know if the is any other way I can be certain?