On 16 June 2018 at 13:50, Björn Persson <Bjorn@rombobjörn.se> wrote: > Tomasz Kłoczko wrote: >> On Fri, 15 Jun 2018 at 23:21, Björn Persson <Bjorn@rombobjörn.se> wrote: >> [..] >> > Don't forget that if your proof of concept can be modified to either >> > overwrite or append to ~/.bashrc, then it's irrelevant to this debate. >> >> before ~/.bashrc is executed many other scripts executions >> already is finished > > This is true and completely irrelevant. > >> Whatever you want to do over you account session or profile scripts it >> is already _to late_. >> Is that clear now? > > No it's not clear. I have no idea why you're rambling about the order > in which Bash executes its startup files. The order doesn't matter, > especially since the hypothetical attacker is supposedly unable to > modify those files. > > You claimed to have a proof of concept that would demonstrate how some > security hole can be exploited if and only if ~/.local/bin is listed > before /usr/bin in PATH. I asked you to post your proof of concept. You > didn't. I will therefore conclude that you don't actually have one. > Well, two things: 1. For example, a kiosk mode, where the home directory is wiped each login would be made less secure. The profile for the GUI is set at login, so writing .bash_profile has no effect on the GUI environment, but an attacker able to place files where the user has write permission could mask system binaries. But a more major worry for me here, the reason I'm bothering to reply to a thread about setting paths (though to be honest, someone who doesn't understand how to do that may not have much business installing unpackaged software, particularly when the examples are developer tools): 2. The fact that a proof of concept cannot be provided is not a proof that a change you make is secure. Take Spectre; that vulnerability has been around for decades with no public proof of concept, or even knowledge there was a vulnerability, yet it can be exploited from Javascript in a browser. So this repeated insistence on providing a proof of concept before a security concern is taken seriously is fundamentally wrong, and I would be concerned to see it applied elsewhere in Fedora. -- imalone http://ibmalone.blogspot.co.uk _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx/message/J7YVS2NVEPDF5TEZ2EFGFKI6TB42F3HA/