- 대통령 측근이 ‘AI 차르’로?···“트럼프, 상원 인준 필요 없는 AI 총괄 임명 추진” 악시오스
- Equinix to cut 3% of staff amidst the greatest demand for data center infrastructure ever
- One of the best portable speakers I tested is $40 off for Black Friday: Get this music powerhouse in a small package
- Best Black Friday gaming PC deals 2024: Sales live now on prebuilt PCs, GPUs, monitors, and more
- Level up your PS5 with this PlayStation VR2 bundle for $250 off before Black Friday
What is sudo in Linux and why is it so important?
Back in the early days of Linux, things were exponentially more complicated. The distributions were far less mature and required a particular system account to get things done. That account was root — and with it, you had unlimited power over your operating system.
Also: Do you need antivirus on Linux?
To demonstrate the power of the root account, one trick you could always play on unsuspecting users was to tell them to change to the root user with the su command and then have them issue the following command:
The rm command is used to delete files and folders. In conjunction with r (recursive) and f (force), you would delete everything from the root folder (/), thus rendering your system unusable.
Also: Can’t remember the Linux command you ran earlier? Let history repeat itself
Back then, any command that required administrative privileges was run via the root user. To do that, you either had to change to the root user (with the su command) or log in as the root user. Both of these options were eventually considered a security issue. A user could do anything if you logged in as the root user and walked away from your system.
Access to the root user meant that if a hacker gained access to your system, they could wreak havoc on the machine.
Eventually, it was decided something had to give. Out of that need, sudo was born. Sudo stands for “superuser do” and effectively allows a regular user (one that belongs to the admin group) access to administrator-like powers. This approach solved two problems:
- The root user could be deactivated (so it couldn’t be as easily leveraged)
- Only users in the admin group (more on this in a bit) could run administrative tasks
Sudo also enabled administrators to add and remove users to or from the sudo group at any time, making it easier to control who has access. This shift was a significant step forward for Linux, which bolstered system security and made life easier for users.
Also: The best Linux distros for beginners
With sudo in place, users no longer had to change to the root user or log in to that account to run administrative commands, such as installing software. Users could run those admin activities through sudo with the same effect as if run from the root user account.
Sudo offered better control over who could do what on any given system. When attempting to run a command that required admin privileges, a user only had to type their user password (also called their sudo password) and the command would go off without a hitch, so long as it was run properly.
Also: The first 5 Linux commands every new user should learn
For example, instead of having to first change to the root user with su and then issuing the update/upgrade commands on a Ubuntu-based distribution, a user could issue the following command:
sudo apt-get update && sudo apt-get upgrade -y
By running apt-get through sudo, the user is granted temporary admin privileges and can successfully issue the commands.
What about users not in the admin group?
Any user you want to grant access to has to be a member of the admin group for the distribution. For example, on Ubuntu-based distributions, that group is sudo. On Red Hat-based distributions, that group is called wheel.
Also: How to permanently mount a drive in Linux (and why you should)
If you have a user who isn’t a member of the admin group, when they attempt to run a command with sudo, they’ll see something like this:
olivia is not in the sudoers file. This incident will be reported.
How do you fix that issue? You add them to the admin group. So, for an Ubuntu-based distribution, the command to add a user to the admin group would be:
sudo usermod -aG sudo USER
Here, USER is the username in question.
On a Red Hat-based distribution (such as Fedora), the command would be:
sudo usermod -aG wheel USER
Again, USER is the username in question.
Also: Why don’t more people use desktop Linux? I have a theory you might not like
After running the command, the user would then either have to log out and log back in, or make the system aware of the changes with the command:
Once a user has been added to the admin group, they can use sudo to run commands that require admin privileges.
Sudo has made Linux more secure and user-friendly. No longer having to change to (or log in to) the root user account avoids some serious security pitfalls and allows you to manage user access to admin tasks.