Re: $HOME/.local/bin in $PATH

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Am 30.10.2013 11:55, schrieb Alec Leamas:
> On 2013-10-30 11:46, Reindl Harald wrote:
>> Am 30.10.2013 11:27, schrieb Alec Leamas:
>>> On 2013-10-30 11:23, Reindl Harald wrote:
>>>> Am 30.10.2013 11:20, schrieb Alec Leamas:
>>>>> On 2013-10-30 10:58, Reindl Harald wrote:
>>>>>> Am 30.10.2013 10:53, schrieb Alec Leamas:
>>>>>>> On 2013-10-30 10:23, Reindl Harald wrote:
>>>>>>>> Am 30.10.2013 02:03, schrieb Chris Adams:
>>>>>>>>> Once upon a time, Reindl Harald <h.reindl@xxxxxxxxxxxxx> said:
>>>>>>>>>> [root@srv-rhsoft:~]$ mkdir test
>>>>>>>>>> i could rm -rf ~/ here
>>>>>>>>>>
>>>>>>>>>> [root@srv-rhsoft:~]$ cat /usr/local/bin/mkdir
>>>>>>>>>> #!/bin/bash
>>>>>>>>>> echo "i could rm -rf ~/ here"
>>>>>>>>> If I can write to files you own, it doesn't matter if there's a
>>>>>>>>> directory in the PATH or not.  I can write this to your .bash_profile:
>>>>>>>>>
>>>>>>>>>        /bin/mkdir $HOME/.bin 2> /dev/null
>>>>>>>>>        echo 'echo "i could rm -rf ~/ here"' > $HOME/.bin/mkdir
>>>>>>>>>        chmod +x $HOME/.bin/mkdir
>>>>>>>>>        PATH=$HOME/.bin:$PATH
>>>>>>>> you can do this and that - but that's no valid argumentation
>>>>>>>> doing bad things in default setups and *at least* do not
>>>>>>>> place *hidden* diretories there, ther is a good reason why
>>>>>>>> software like rkhunter alerts if you have hidden directories
>>>>>>>> somewhere in /usr/bin/
>>>>>>>>
>>>>>>> Some kind of reference for the bad in having a well-known, hidden directory in the path?
>>>>>> the *writeable for the user* is the problem
>>>>> Any reference for this problem?
>>>> what about consider the implications?
>>>> do you really need a written reference for any security relevant fact?
>>>> i can write one for you if you prefer links :-)
>>>>
>>> Well, the question is really if someone else out there share your concerns about this
>> anybody with interests in security
>>
>> https://www.google.at/search?q=ssh+chroot+why+needs+the+home+directory+to+be+owned+by+root
>>
>> http://binblog.info/2008/04/06/openssh-chrooted-sftp-eg-for-webhosting/
>> However, the chroot destination must not be owned by the user for security reasons
>>
> So you are arguing that $HOME should be owned by root?!  

*no i do not*

i gave you a starting point to learn about security and the reason
for sftp-chroot doing so is that someone could use race-conditions
to bypass the security

if you do not understand that allowing any random application running
with your normal user permissions place a binary inside PATH is a bad
idea i really can not help you

security is *always* a process and layered, there are a lot of things
to consider in different levels and while you can not gain 100%
security you can make it harder to bypass restrictions on several
places and doing things which are clearly against is not smart

you can decide taht security is not that important for you
but a distribution as such should not make such wrong decisions for all users

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux