Run apt-get without sudo

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP








up vote
13
down vote

favorite
5












This might be a very naive question, but I wanted to know how I could give multiple users access to a single computer without making them root users. How would I give them limitted sudo access such that they could still issue commands like



sudo apt-get install epstopdf


I imagine this could be an incredibly stupid question as once root user access is given, they could do whatever they want. Therefore, is there any way around this? I am open to suggestions







share|improve this question























    up vote
    13
    down vote

    favorite
    5












    This might be a very naive question, but I wanted to know how I could give multiple users access to a single computer without making them root users. How would I give them limitted sudo access such that they could still issue commands like



    sudo apt-get install epstopdf


    I imagine this could be an incredibly stupid question as once root user access is given, they could do whatever they want. Therefore, is there any way around this? I am open to suggestions







    share|improve this question





















      up vote
      13
      down vote

      favorite
      5









      up vote
      13
      down vote

      favorite
      5






      5





      This might be a very naive question, but I wanted to know how I could give multiple users access to a single computer without making them root users. How would I give them limitted sudo access such that they could still issue commands like



      sudo apt-get install epstopdf


      I imagine this could be an incredibly stupid question as once root user access is given, they could do whatever they want. Therefore, is there any way around this? I am open to suggestions







      share|improve this question











      This might be a very naive question, but I wanted to know how I could give multiple users access to a single computer without making them root users. How would I give them limitted sudo access such that they could still issue commands like



      sudo apt-get install epstopdf


      I imagine this could be an incredibly stupid question as once root user access is given, they could do whatever they want. Therefore, is there any way around this? I am open to suggestions









      share|improve this question










      share|improve this question




      share|improve this question









      asked Oct 31 '11 at 11:58









      puk

      60751121




      60751121




















          2 Answers
          2






          active

          oldest

          votes

















          up vote
          18
          down vote



          accepted










          Open a terminal and type sudo visudo. At the end of the file (really the last line in it) type %yourusername% ALL=NOPASSWD: /usr/bin/apt-get install where %yourusername% is replaced by your username.



          After that you wont be prompted for a password to use sudo apt-get install anymore but please understand this is a very risky solution, there is a reason why you need to type a password for some commands, the use of these commands without password can leave your system open for some dangers. Use with caution.






          share|improve this answer























          • Could sudo apt-get install lead to problems by, for example, installing a program which does rm -f -r / ?
            – puk
            Oct 31 '11 at 20:43






          • 3




            Well, no not really. And if it does you need to type sudo rm -rf / and the instructions I gave are only to enable sudo apt-get install, even if you enable a PPA that has that kind of code, even if you install it without really knowing what you are doing and the program tries to run he wont have access... You did not give yourself sudo rm permition, only sudo apt-get install. Its the safest approach to a insecure situation ;)
            – Bruno Pereira
            Oct 31 '11 at 20:50










          • fixed the path to the file was wrong :D the path was not /usr/sbin but /usr/bin ;) it just works
            – Bruno Pereira
            Oct 31 '11 at 21:15











          • Sudo with a password isn't much more secure than without. In fact in someways it can be considered less secure depending on the situation. If you are in a position to use the sudo command it's fairly easy to override it in a bash profile. You can install a fake sudo that logs the password. Having the password would allow other hosts to be compromised (if they allow password logins), or other sudo commands to be run. If you allow passwordless sudo for specific commands then that isn't such an issue. One time passwords are also another possibility but you can still hijack the sudo.
            – David C. Bishop
            Dec 13 '14 at 22:42






          • 1




            On Ubuntu 15.04 this disallows a meaningful install, allowing literally sudo /usr/bin/apt-get install with no parameters. If a package name is added then sudo asks for a password and gives a "Sorry..." error.
            – Paul
            Jun 5 '15 at 5:03


















          up vote
          7
          down vote













          sudo is exactly made for that. By editing the sudoers file you can give users specific privileges. See the manual page of sudoers(5) for details.






          share|improve this answer























            Your Answer







            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "89"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: true,
            noModals: false,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );








             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f74054%2frun-apt-get-without-sudo%23new-answer', 'question_page');

            );

            Post as a guest






























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            18
            down vote



            accepted










            Open a terminal and type sudo visudo. At the end of the file (really the last line in it) type %yourusername% ALL=NOPASSWD: /usr/bin/apt-get install where %yourusername% is replaced by your username.



            After that you wont be prompted for a password to use sudo apt-get install anymore but please understand this is a very risky solution, there is a reason why you need to type a password for some commands, the use of these commands without password can leave your system open for some dangers. Use with caution.






            share|improve this answer























            • Could sudo apt-get install lead to problems by, for example, installing a program which does rm -f -r / ?
              – puk
              Oct 31 '11 at 20:43






            • 3




              Well, no not really. And if it does you need to type sudo rm -rf / and the instructions I gave are only to enable sudo apt-get install, even if you enable a PPA that has that kind of code, even if you install it without really knowing what you are doing and the program tries to run he wont have access... You did not give yourself sudo rm permition, only sudo apt-get install. Its the safest approach to a insecure situation ;)
              – Bruno Pereira
              Oct 31 '11 at 20:50










            • fixed the path to the file was wrong :D the path was not /usr/sbin but /usr/bin ;) it just works
              – Bruno Pereira
              Oct 31 '11 at 21:15











            • Sudo with a password isn't much more secure than without. In fact in someways it can be considered less secure depending on the situation. If you are in a position to use the sudo command it's fairly easy to override it in a bash profile. You can install a fake sudo that logs the password. Having the password would allow other hosts to be compromised (if they allow password logins), or other sudo commands to be run. If you allow passwordless sudo for specific commands then that isn't such an issue. One time passwords are also another possibility but you can still hijack the sudo.
              – David C. Bishop
              Dec 13 '14 at 22:42






            • 1




              On Ubuntu 15.04 this disallows a meaningful install, allowing literally sudo /usr/bin/apt-get install with no parameters. If a package name is added then sudo asks for a password and gives a "Sorry..." error.
              – Paul
              Jun 5 '15 at 5:03















            up vote
            18
            down vote



            accepted










            Open a terminal and type sudo visudo. At the end of the file (really the last line in it) type %yourusername% ALL=NOPASSWD: /usr/bin/apt-get install where %yourusername% is replaced by your username.



            After that you wont be prompted for a password to use sudo apt-get install anymore but please understand this is a very risky solution, there is a reason why you need to type a password for some commands, the use of these commands without password can leave your system open for some dangers. Use with caution.






            share|improve this answer























            • Could sudo apt-get install lead to problems by, for example, installing a program which does rm -f -r / ?
              – puk
              Oct 31 '11 at 20:43






            • 3




              Well, no not really. And if it does you need to type sudo rm -rf / and the instructions I gave are only to enable sudo apt-get install, even if you enable a PPA that has that kind of code, even if you install it without really knowing what you are doing and the program tries to run he wont have access... You did not give yourself sudo rm permition, only sudo apt-get install. Its the safest approach to a insecure situation ;)
              – Bruno Pereira
              Oct 31 '11 at 20:50










            • fixed the path to the file was wrong :D the path was not /usr/sbin but /usr/bin ;) it just works
              – Bruno Pereira
              Oct 31 '11 at 21:15











            • Sudo with a password isn't much more secure than without. In fact in someways it can be considered less secure depending on the situation. If you are in a position to use the sudo command it's fairly easy to override it in a bash profile. You can install a fake sudo that logs the password. Having the password would allow other hosts to be compromised (if they allow password logins), or other sudo commands to be run. If you allow passwordless sudo for specific commands then that isn't such an issue. One time passwords are also another possibility but you can still hijack the sudo.
              – David C. Bishop
              Dec 13 '14 at 22:42






            • 1




              On Ubuntu 15.04 this disallows a meaningful install, allowing literally sudo /usr/bin/apt-get install with no parameters. If a package name is added then sudo asks for a password and gives a "Sorry..." error.
              – Paul
              Jun 5 '15 at 5:03













            up vote
            18
            down vote



            accepted







            up vote
            18
            down vote



            accepted






            Open a terminal and type sudo visudo. At the end of the file (really the last line in it) type %yourusername% ALL=NOPASSWD: /usr/bin/apt-get install where %yourusername% is replaced by your username.



            After that you wont be prompted for a password to use sudo apt-get install anymore but please understand this is a very risky solution, there is a reason why you need to type a password for some commands, the use of these commands without password can leave your system open for some dangers. Use with caution.






            share|improve this answer















            Open a terminal and type sudo visudo. At the end of the file (really the last line in it) type %yourusername% ALL=NOPASSWD: /usr/bin/apt-get install where %yourusername% is replaced by your username.



            After that you wont be prompted for a password to use sudo apt-get install anymore but please understand this is a very risky solution, there is a reason why you need to type a password for some commands, the use of these commands without password can leave your system open for some dangers. Use with caution.







            share|improve this answer















            share|improve this answer



            share|improve this answer








            edited Oct 31 '11 at 21:11


























            answered Oct 31 '11 at 13:45









            Bruno Pereira

            58k26175202




            58k26175202











            • Could sudo apt-get install lead to problems by, for example, installing a program which does rm -f -r / ?
              – puk
              Oct 31 '11 at 20:43






            • 3




              Well, no not really. And if it does you need to type sudo rm -rf / and the instructions I gave are only to enable sudo apt-get install, even if you enable a PPA that has that kind of code, even if you install it without really knowing what you are doing and the program tries to run he wont have access... You did not give yourself sudo rm permition, only sudo apt-get install. Its the safest approach to a insecure situation ;)
              – Bruno Pereira
              Oct 31 '11 at 20:50










            • fixed the path to the file was wrong :D the path was not /usr/sbin but /usr/bin ;) it just works
              – Bruno Pereira
              Oct 31 '11 at 21:15











            • Sudo with a password isn't much more secure than without. In fact in someways it can be considered less secure depending on the situation. If you are in a position to use the sudo command it's fairly easy to override it in a bash profile. You can install a fake sudo that logs the password. Having the password would allow other hosts to be compromised (if they allow password logins), or other sudo commands to be run. If you allow passwordless sudo for specific commands then that isn't such an issue. One time passwords are also another possibility but you can still hijack the sudo.
              – David C. Bishop
              Dec 13 '14 at 22:42






            • 1




              On Ubuntu 15.04 this disallows a meaningful install, allowing literally sudo /usr/bin/apt-get install with no parameters. If a package name is added then sudo asks for a password and gives a "Sorry..." error.
              – Paul
              Jun 5 '15 at 5:03

















            • Could sudo apt-get install lead to problems by, for example, installing a program which does rm -f -r / ?
              – puk
              Oct 31 '11 at 20:43






            • 3




              Well, no not really. And if it does you need to type sudo rm -rf / and the instructions I gave are only to enable sudo apt-get install, even if you enable a PPA that has that kind of code, even if you install it without really knowing what you are doing and the program tries to run he wont have access... You did not give yourself sudo rm permition, only sudo apt-get install. Its the safest approach to a insecure situation ;)
              – Bruno Pereira
              Oct 31 '11 at 20:50










            • fixed the path to the file was wrong :D the path was not /usr/sbin but /usr/bin ;) it just works
              – Bruno Pereira
              Oct 31 '11 at 21:15











            • Sudo with a password isn't much more secure than without. In fact in someways it can be considered less secure depending on the situation. If you are in a position to use the sudo command it's fairly easy to override it in a bash profile. You can install a fake sudo that logs the password. Having the password would allow other hosts to be compromised (if they allow password logins), or other sudo commands to be run. If you allow passwordless sudo for specific commands then that isn't such an issue. One time passwords are also another possibility but you can still hijack the sudo.
              – David C. Bishop
              Dec 13 '14 at 22:42






            • 1




              On Ubuntu 15.04 this disallows a meaningful install, allowing literally sudo /usr/bin/apt-get install with no parameters. If a package name is added then sudo asks for a password and gives a "Sorry..." error.
              – Paul
              Jun 5 '15 at 5:03
















            Could sudo apt-get install lead to problems by, for example, installing a program which does rm -f -r / ?
            – puk
            Oct 31 '11 at 20:43




            Could sudo apt-get install lead to problems by, for example, installing a program which does rm -f -r / ?
            – puk
            Oct 31 '11 at 20:43




            3




            3




            Well, no not really. And if it does you need to type sudo rm -rf / and the instructions I gave are only to enable sudo apt-get install, even if you enable a PPA that has that kind of code, even if you install it without really knowing what you are doing and the program tries to run he wont have access... You did not give yourself sudo rm permition, only sudo apt-get install. Its the safest approach to a insecure situation ;)
            – Bruno Pereira
            Oct 31 '11 at 20:50




            Well, no not really. And if it does you need to type sudo rm -rf / and the instructions I gave are only to enable sudo apt-get install, even if you enable a PPA that has that kind of code, even if you install it without really knowing what you are doing and the program tries to run he wont have access... You did not give yourself sudo rm permition, only sudo apt-get install. Its the safest approach to a insecure situation ;)
            – Bruno Pereira
            Oct 31 '11 at 20:50












            fixed the path to the file was wrong :D the path was not /usr/sbin but /usr/bin ;) it just works
            – Bruno Pereira
            Oct 31 '11 at 21:15





            fixed the path to the file was wrong :D the path was not /usr/sbin but /usr/bin ;) it just works
            – Bruno Pereira
            Oct 31 '11 at 21:15













            Sudo with a password isn't much more secure than without. In fact in someways it can be considered less secure depending on the situation. If you are in a position to use the sudo command it's fairly easy to override it in a bash profile. You can install a fake sudo that logs the password. Having the password would allow other hosts to be compromised (if they allow password logins), or other sudo commands to be run. If you allow passwordless sudo for specific commands then that isn't such an issue. One time passwords are also another possibility but you can still hijack the sudo.
            – David C. Bishop
            Dec 13 '14 at 22:42




            Sudo with a password isn't much more secure than without. In fact in someways it can be considered less secure depending on the situation. If you are in a position to use the sudo command it's fairly easy to override it in a bash profile. You can install a fake sudo that logs the password. Having the password would allow other hosts to be compromised (if they allow password logins), or other sudo commands to be run. If you allow passwordless sudo for specific commands then that isn't such an issue. One time passwords are also another possibility but you can still hijack the sudo.
            – David C. Bishop
            Dec 13 '14 at 22:42




            1




            1




            On Ubuntu 15.04 this disallows a meaningful install, allowing literally sudo /usr/bin/apt-get install with no parameters. If a package name is added then sudo asks for a password and gives a "Sorry..." error.
            – Paul
            Jun 5 '15 at 5:03





            On Ubuntu 15.04 this disallows a meaningful install, allowing literally sudo /usr/bin/apt-get install with no parameters. If a package name is added then sudo asks for a password and gives a "Sorry..." error.
            – Paul
            Jun 5 '15 at 5:03













            up vote
            7
            down vote













            sudo is exactly made for that. By editing the sudoers file you can give users specific privileges. See the manual page of sudoers(5) for details.






            share|improve this answer



























              up vote
              7
              down vote













              sudo is exactly made for that. By editing the sudoers file you can give users specific privileges. See the manual page of sudoers(5) for details.






              share|improve this answer

























                up vote
                7
                down vote










                up vote
                7
                down vote









                sudo is exactly made for that. By editing the sudoers file you can give users specific privileges. See the manual page of sudoers(5) for details.






                share|improve this answer















                sudo is exactly made for that. By editing the sudoers file you can give users specific privileges. See the manual page of sudoers(5) for details.







                share|improve this answer















                share|improve this answer



                share|improve this answer








                edited Jun 9 at 21:29









                David Foerster

                25.7k1361105




                25.7k1361105











                answered Oct 31 '11 at 12:03









                Michael K

                9,44011420




                9,44011420






















                     

                    draft saved


                    draft discarded


























                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f74054%2frun-apt-get-without-sudo%23new-answer', 'question_page');

                    );

                    Post as a guest













































































                    Popular posts from this blog

                    pylint3 and pip3 broken

                    Missing snmpget and snmpwalk

                    How to enroll fingerprints to Ubuntu 17.10 with VFS491