su vs sudo -s vs sudo -i vs sudo bash
With su
, you become another user — root by default, but potentially another user. If you say su -
, your environment gets replaced with that user's login environment as well, so that what you see is indistinguishable from logging in as that user. There is no way the system can tell what you do while su
'd to another user from actions by that user when they log in.
Things are very different with sudo
:
Commands you run through
sudo
execute as the target user — root by default, but changeable with-u
— but it logs the commands you run through it, tagging them with your username so blame can be assigned afterward. :)sudo
is very flexible. You can limit the commands a given user or group of users are allowed to run, for example. Withsu
, it's all or nothing.This feature is typically used to define roles. For instance, you could define a "backups" group allowed to run
dump
andtar
, each of which needs root access to properly back up the system disk.I mention this here because it means you can give someone
sudo
privileges without giving themsudo -s
orsudo bash
abilities. They have only the permissions they need to do their job, whereas withsu
they have run of the entire system. You have to be careful with this, though: if you give someone the ability to saysudo vi
, for example, they can shell out ofvi
and have effectively the same power as withsudo -s
.Because it takes the sudoer's password instead of the root password,
sudo
isolates permission between multiple sudoers.This solves an administrative problem with
su
, which is that when the root password changes, all those who had to know it to usesu
had to be told.sudo
allows the sudoers' passwords to change independently. In fact, it is common to password-lock the root user's account on a system withsudo
to force all sysadmin tasks to be done viasudo
. In a large organization with many trusted sudoers, this means when one of the sysadmins leaves, you don't have to change the root password and distribute it to those admins who remain.
The main difference between sudo bash
and sudo -s
is that -s
is shorter and lets you pass commands to execute in your user's default shell in a couple of ways:
You can say
sudo -s some-command
which runssome-command
under your shell. It's basically shorthand forsudo $SHELL -c some-command
.You can instead pass the commands to the shell's standard input, like
sudo -s < my-shell-script
. You could use this with a heredoc to send several commands to a singlesudo
call, avoiding the need to typesudo
repeatedly.
Both of those behaviors are optional. Far more commonly, you give -s
alone, so it just runs your user's shell interactively. In that mode, it differs from sudo bash
in that it might run a different shell than bash
, since it looks first in the SHELL
environment variable, and then if that is unset, at your user's login shell setting, typically in /etc/passwd
.
The shell run by sudo -s
inherits your current user environment. If what you actually want is a clean environment, like you get just after login, what you want instead is sudo -i
, a relatively recent addition to sudo
. Roughly speaking, sudo -i
is to sudo -s
as su -
is to su
: it resets all but a few key environment variables and sends you back to your user's home directory. If you don't also give it commands to run under that shell via standard input or sudo -i some-command
, it will run that shell as an interactive login shell, so your user's shell startup scripts (e.g. .bash_profile
) get run again.
All of this makes sudo -i
considerably more secure than sudo -s
. Why? Because if someone can modify your environment before sudo -s
, they could cause unintended commands to be executed. The most obvious case is modifying SHELL
, but it can also happen less directly, such as via PAGER
if you say man foo
while under sudo -s
.
You might say, "If they can modify PAGER
, they can modify PATH
, and then they can just substitute an evil sudo
program," but someone sufficiently paranoid can say /usr/bin/sudo /bin/bash
to avoid that trap. You're probably not so paranoid that you also avoid the traps in all the other susceptible environment variables, though. Did you also remember to check EDITOR
, for example, before running any VCS command? Thus sudo -i
.
Because sudo -i
also changes your working directory to your user's home directory, you might still want to use sudo -s
for those situations where you know you want to remain in the same directory you were cd
'd into when you ran sudo
. It's still safer to sudo -i
and cd
back to where you were, though.
From an ubuntuforums post I made a while ago:
Consider the following experiment:
applic@ion:~% sudo su
[sudo] password for applic:
root@ion:/home/applic# env > /tmp/sudo_su_env
root@ion:/home/applic# exit
exit
applic@ion:~% sudo -s
applic .bashrc read...
root@ion:~% env >/tmp/sudo_s
Here are the differences I found:
With sudo -s
:
HOME=/home/applic
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/X11R6/bin
reads $USER's ~/.bashrc
With sudo su
:
HOME=/root
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
reads /etc/environment
reads /root/.bashrc
Notice the difference in $HOME
. Being root and having $HOME
set to the normal user's home can cause problems. For example, if you run a graphical app, the normal user's ~/.Xauthority
can get overwritten by root. This causes the normal user problems later on such as not being able to run certain graphical apps through cron.
To summarize:
corrupted by user's
HOME=/root uses root's PATH env vars
sudo -i Y Y[2] N
sudo -s N Y[2] Y
sudo bash N Y[2] Y
sudo su Y N[1] Y
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
probably set by/etc/environment
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/X11R6/bin
The bottom line is sudo -i
is the proper command to run when you want a root shell that is untainted by the user's environment.
su
(switch user or substitute user) lets you switch user. su
basically starts another shell instance with the privileges of the intended user. By default it switches you to the root
user, if we want to switch specific user we need to pass user as follows:
$ su bob # switches to bob (requires bob's password)
su -
means environment variables will be reset to root and su
means environment variables as old user.
for example: root's home directory if you use su -
or old user home directory if you use su
.
sudo (super user do) is a command-line utility that allows users to run programs with the security privileges of another user, by default is superuser i.e root
. It uses a config file /etc/sudoers
which lists which users have rights to specific actions
sudo should be read as /ˈsuːduː/. syntax sudo command
i.e. switch user and do this command.
su
is equivalent tosudo -i
and simulates a login into the root account. Your working directory will be/root
, and it will read root's.profile
etc. The prompt will change from $ to #, indicating you have root access.sudo -s
launches a shell as root, but doesn't change your working directory.sudo bash
wherebash
is command to run withsudo
. This command runsbash
as a super user.- Using
sudo
can be logged everything someone does. - Using
sudo
prevents a user from having to know the root password. - Using
sudo
we can limit the commands are allowed to run.