101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

517
active users

#policykit

0 posts0 participants0 posts today
Elias Probst<p><span class="h-card"><a href="https://meow.social/@Hemera" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Hemera</span></a></span> any chances you're talking about <a href="https://mastodon.social/tags/PolicyKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolicyKit</span></a>? 😅</p>
LisPi<p><span class="h-card"><a href="https://mastodon.social/@eliasp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>eliasp</span></a></span> <span class="h-card"><a href="https://mastodon.social/@rust_discussions" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rust_discussions</span></a></span> <a href="https://mastodon.top/tags/PolicyKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolicyKit</span></a> used to be quite the obtusely documented mess. Has that improved?</p><p>All the JS-based rules stuff seems to still have no documentation in Debian (even with policykit-1-doc installed) beyond the default rules (if you count that as docs).</p>
Elias Probst<p><span class="h-card"><a href="https://mastodon.social/@rust_discussions" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rust_discussions</span></a></span> none of my systems has <a href="https://mastodon.social/tags/sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudo</span></a> - and never had.<br>"Back in the days", I just used "su", nowadays most applications use <a href="https://mastodon.social/tags/PolicyKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolicyKit</span></a> to get elevated privileges for a specific operation and in case I need a full shell, "machinectl shell .host" (aliased to "msh" here) provides a proper (not just subprocess-spawned) session incl. a DBus and systemd user-session.</p><p><a href="https://mastodon.social/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> <a href="https://mastodon.social/tags/dbus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dbus</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
lj·rk<p>Do any <a href="https://todon.eu/tags/GNOME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNOME</span></a> folx know why polkit-gnome <a href="https://gitlab.gnome.org/Archive/policykit-gnome" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.gnome.org/Archive/polic</span><span class="invisible">ykit-gnome</span></a> got archived and is considered "legacy" now? What is "the way" to have graphical applications ask for rights through <a href="https://todon.eu/tags/PolKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolKit</span></a> <a href="https://todon.eu/tags/PolicyKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolicyKit</span></a>?</p>
Elias Probst<p><span class="h-card"><a href="https://mastodon.ar.al/@aral" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>aral</span></a></span> the fact, that "list-machines" provides output is most likely the inconsistency here, as machines are also global.<br>The difference between <a href="https://mastodon.social/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a>'s "--system" and "--user" mode is, whether something is managed within a user's resources and/or session, like user units/services running within a user's login/desktop session.<br>This has nothing to do with a users permissions to control services in the system context, for which privileges are granted via <a href="https://mastodon.social/tags/DBus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DBus</span></a> through <a href="https://mastodon.social/tags/PolicyKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolicyKit</span></a></p>
DansLeRuSH ᴱᶰ<p>« <a href="https://fosstodon.org/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> company Qualys has uncovered a truly dangerous memory corruption <a href="https://fosstodon.org/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> in polkit's pkexec, CVE-2021-4034. <a href="https://fosstodon.org/tags/Polkit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Polkit</span></a>, formerly known as <a href="https://fosstodon.org/tags/PolicyKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PolicyKit</span></a>, is a <a href="https://fosstodon.org/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> SUID-root program. It's installed by default in every major <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> distribution. » ⚠️ <a href="https://www.zdnet.com/article/major-linux-policykit-security-vulnerability-uncovered-pwnkit/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zdnet.com/article/major-linux-</span><span class="invisible">policykit-security-vulnerability-uncovered-pwnkit/</span></a></p>