Skip to content

Commit db1930c

Browse files
authored
Merge pull request #742 from memorysafety/upd-readme
README touch-ups
2 parents d5ae3d3 + f97d593 commit db1930c

File tree

2 files changed

+23
-25
lines changed

2 files changed

+23
-25
lines changed

README.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,21 @@
22

33
A safety oriented and memory safe implementation of sudo and su written in Rust.
44

5-
## ⚠️ WARNING
5+
## Status of this project
66

7-
**Sudo-rs is currently under active development and is not suited for any
8-
production environment. Using sudo-rs is only recommended for development and
9-
testing purposes, but you should expect any system that has sudo-rs installed to
10-
break easily and to not be secure.**
7+
Sudo-rs is being developed further; features you might expect form original sudo
8+
may still be unimplemented or not planned. If there is an important one you need,
9+
please request it using the issue tracker. If you encounter any usability bugs,
10+
also please report them on the [issue tracker](https://github.com/memorysafety/sudo-rs/issues).
11+
Suspected vulnerabilities can be reported on our [security page](https://github.com/memorysafety/sudo-rs/security).
1112

12-
Sudo-rs currently only supports Linux-based operating systems, even if it compiles
13-
on a different system, it will not run properly.
13+
An audit of sudo-rs will take place in September 2023, the next stable release will
14+
incorporate its results.
1415

15-
## Quick start
16+
Sudo-rs currently is targeted for Linux-based operating systems only; Linux kernel 5.9
17+
or newer is necessary to run sudo-rs.
1618

17-
**We do not offer binary packages yet**
19+
## Building it yourself
1820

1921
Sudo-rs is written in Rust. The minimum required Rust version is 1.70. If your
2022
Linux distribution does not package that version (or a later one), you can always
@@ -28,8 +30,7 @@ cargo build --release
2830

2931
This produces a binary `target/release/sudo`. However, this binary must have
3032
the setuid flag set and must be owned by the root user in order to provide any
31-
useful functionality. If you are unsure about how to set this up, then the
32-
current version of sudo is not intended for you.
33+
useful functionality. Consult your operating system manual for details.
3334

3435
Sudo-rs needs the sudoers configuration file. The sudoers configuration file
3536
will be loaded from `/etc/sudoers-rs` if that file exists, otherwise the
@@ -59,14 +60,15 @@ Exceptions to the above, with respect to your `/etc/sudoers` configuration:
5960

6061
Some other notable restrictions to be aware of:
6162

62-
* Some functionality is not yet supported; in particular `sudoedit`, `sudo --list`,
63-
and we also do not yet provide our own `visudo`.
63+
* Some functionality is not yet supported; in particular `sudoedit` and preventing shell
64+
escapes using `NOEXEC` and `NOINTERCEPT`.
65+
* Per-user, per-command, per-host `Defaults` sudoers entries for finer-grained control
66+
are not (yet) supported.
6467
* Sudo-rs always uses PAM for authentication at this time, your system must be
6568
set up for PAM. Sudo-rs will use the `sudo` service configuration. This also means
6669
that resource limits, umasks, etc have to be configured via PAM and not through
6770
the sudoers file.
6871
* sudo-rs will not include the sendmail support of original sudo.
69-
* Per-user, per-command, per-host `Defaults` sudoers entries are not supported.
7072
* The sudoers file must be valid UTF-8.
7173

7274
If you find a common use case for original sudo missing, please create a feature

SECURITY.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -25,21 +25,17 @@ also follow the steps at https://www.sudo.ws/security/policy/
2525
We prefer to receive reports in English. If necessary, we also understand Spanish, German and Dutch.
2626

2727
## Disclosure Policy
28-
Like original sudo, we adhere to the principle of [responsible disclosure](https://vuls.cert.org/confluence/display/CVD/Executive+Summary).
28+
Like original sudo, we adhere to the principle of [Coordinated Vulnerability Disclosure](https://vuls.cert.org/confluence/display/CVD/Executive+Summary).
2929

3030
Security Advisories
3131
===================
32-
`sudo-rs` is currently in an alpha stage, and does not have any releases yet, nor do we offer support. Therefore we strongly recommend not
33-
using it for anything else than experiments.
34-
35-
Once we offer official releases, security advisories will be published [on GitHub](https://github.com/memorysafety/sudo-rs/security/advisories)
32+
Security advisories will be published [on GitHub](https://github.com/memorysafety/sudo-rs/security/advisories)
3633
and possibly through other channels.
37-
3834
-----BEGIN PGP SIGNATURE-----
3935

40-
iHUEARYIAB0WIQTC5MrEsSIl3hw7sckonQggA9AelQUCZEe6XAAKCRAonQggA9Ae
41-
lRa9AQC0KKLxA09UdSHdR4mhle0zyq411sVPbtNo03achQ05yQD/dBi8aqcF3+s7
42-
vdQpPgv8CHf+7YdrZh8uVIzr+ToDZwQ=
43-
=RPT9
44-
36+
iJMEARYIADsWIQTC5MrEsSIl3hw7sckonQggA9AelQUCZOxufR0cc2VjdXJpdHkr
37+
c3Vkb0B0d2VlZGVnb2xmLmNvbQAKCRAonQggA9AelYxBAQCXNaMcO9IUr8u4RT8j
38+
6ifxmca+MM9nyobBVdAAPaTwKQEA38XwSrRj/TApoZvDPchq8Weszk6Ke1arNQ/a
39+
wZD+KAI=
40+
=oRsJ
4541
-----END PGP SIGNATURE-----

0 commit comments

Comments
 (0)