>> So my question is, will there be any security implications that I
>> should be concerned about with setting wxallowed in /etc/fstab to the
>> home mountpoint?
>
> Yes there is a security implication. From mount(8),
>
>              wxallowed  Processes that ask for memory to be made writeable
>                         plus executable using the mmap(2) and mprotect(2)
>                         system calls are killed by default.  This option
>                         allows those processes to continue operation.  It is
>                         typically used on the /usr/local filesystem.
>
> That will allow this program to do create such memory.  It will also
> allow any other program in your /home to do so.
>
> We don't know what other programs you might have in /home.  That's
> why this feature was designed to operate in this restrictive way.
>
> In a perfect world, software would stop asking for W|X memory.  We
> aren't there yet.  This mechanism softly applies pressure towards
> that end.
>
> Turn it off and accept the consequences, and potential risks if you
> like.  W|X memory isn't the only risk out there...
>

Thank you Theo. After reading through your reply I would rather not
deal with a potential risk. I decided to go down the path of adding a
venv directory in /usr/local and giving my account as owner and wheel
as group. This should allow the python binaries to stay in /usr/local
and not have to set wxallowed on my /home directory. I believe this to
be a safer option but unfortunately security is not my strong suite so
I might be missing another security implication by going down this
road.

Reply via email to