On 2 May 2018 at 10:08, Kamil Dudka <kdu...@redhat.com> wrote:
> On Wednesday, May 2, 2018 3:46:34 PM CEST Stephen Gallagher wrote:
>> On Wed, May 2, 2018 at 6:44 AM Miro Hrončok <mhron...@redhat.com> wrote:
>> > On 2.5.2018 15:30, Stephen Gallagher wrote:
>> > >     Does anyone see a reason not to prioritize ~/.local/bin over
>> >
>> > /usr/bin?
>> >
>> > > Yes, if a user's account is compromised (or any service running as
>> > > them), it's REALLY easy to drop faked tools into a user-private
>> > > directory and override critical system tools (like replacing 'bash' with
>> > > a keylogger).
>> >
>> > If user's account is compromised, user's PATH can be changed. IMHO the
>> > provided argument is not valid.
>>
>> There are a lot of ways where their account can be compromised without
>> having complete session access. If they're running a web-connected
>> application as their user, that application could be compromised to write a
>> file to disk. If that file can now supersede the system copy, they have now
>> escalated the degree of the compromise.
>
> You have two choices:
>
> 1. Either you allow users to easily install software to their home directory.
>    If their user account is compromised, an attacker can install some software
>    they do not want to install, but it still affects their user account only.
>

The issue is where they do not know they have installed software to
their home directory. This leads to the problem outlined in
https://xkcd.com/1200/ where the user account is more precious than
having root.

> 2. You do not allow users to easily install software to their home directory.
>    In that case, they will install questionable software using sudo, which
>    gives it root privileges and affects all other users on the system (and
>    possibly other systems reachable through a trusted network).
>

Which most users will do anyway because every stackoverflow and
software install says you have to do a 'curl | su -' or a 'sudo
pip/gem/etc install'


3. You do not allow users to easily install software to their home
directory. You do not allow them to get sudo access either. They have
limited access on that box because they may need to do certain tasks
which are audited and controlled.  [This is the usual case for server
systems because you have to follow rules which are dictated outside of
either the system admin, user or OS manufacturer.]

What happens then is that users do not want to be on that system and
will set up their own system.

> Which of those choices is more secure?
>

None of them is more secure because security is an overloaded template
versus a single term. Each of those has its own threat analysis and
may have reasons to be done in one place or another. Most of those may
be dictated by outside forces. Trying to say if one is more secure is
like saying "Which one is more colour? Red, blue or green?"



> Kamil
>
> _______________________________________________
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org



-- 
Stephen J Smoogen.
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org

Reply via email to