Re: [qubes-users] Kicking the sudoers dead horse

2017-03-15 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-03-14 19:04, 7v5w7go9ub0o wrote: > On 03/14/2017 06:08 AM, Andrew David Wong wrote: >> On 2017-03-12 15:09, 7v5w7go9ub0o wrote: >>> On 03/12/2017 12:45 PM, Andrew David Wong wrote: On 2017-03-11 19:41, Unman wrote: > On Sat, Mar 11,

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-15 Thread Nick Darren
On 03/15/2017 02:24 AM, Chris Laprise wrote: > On 03/14/2017 07:18 PM, Chris Laprise wrote: >> >> # Protect sh and bash init files >> chfiles="/home/user/.bashrc /home/user/.bash_profile /home/user \ >> /.bash_login /home/user/.bash_logout /home/user/.profile" >> touch $chfiles >> chown -f root:roo

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-15 Thread cooloutac
On Wednesday, March 15, 2017 at 3:15:15 PM UTC-4, cooloutac wrote: > On Tuesday, March 14, 2017 at 7:22:04 PM UTC-4, Chris Laprise wrote: > > On 03/14/2017 12:57 PM, cooloutac wrote: > > > > > yes I agree having to click yes in a dom0 popup will not be cumbersome > > > for most. But is it that ea

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-15 Thread cooloutac
On Tuesday, March 14, 2017 at 7:22:04 PM UTC-4, Chris Laprise wrote: > On 03/14/2017 12:57 PM, cooloutac wrote: > > > yes I agree having to click yes in a dom0 popup will not be cumbersome for > > most. But is it that easy for the devs to implement? > > Its already there, for a long time now. Th

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-15 Thread sm8ax1
Chris Laprise: > On 03/14/2017 11:30 PM, sm8ax1 wrote: > >> Second, you mention that ~/.bin/sudo could be overwritten with the >> attacker's binary or a script. I'm not sure I understand what you mean >> exactly... the real sudo works by virtue of being owned by root with >> suid. An attacker runn

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread Chris Laprise
On 03/14/2017 11:30 PM, sm8ax1 wrote: Second, you mention that ~/.bin/sudo could be overwritten with the attacker's binary or a script. I'm not sure I understand what you mean exactly... the real sudo works by virtue of being owned by root with suid. An attacker running as user cannot create a f

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread sm8ax1
Chris Laprise: > On 03/14/2017 09:13 AM, sm8ax1 wrote: > > >> I still haven't heard any rebuttals against how sudo can help mitigate >> attacks against the virtualization (persistence aside). Without sudo, >> unprivileged processes can access /proc/xen/privcmd, raw sockets, memory >> mappings, et

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread Chris Laprise
On 03/14/2017 07:18 PM, Chris Laprise wrote: # Protect sh and bash init files chfiles="/home/user/.bashrc /home/user/.bash_profile /home/user \ /.bash_login /home/user/.bash_logout /home/user/.profile" touch $chfiles chown -f root:root $chfiles chattr +i $chfiles The line break on that didn't

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread 7v5w7go9ub0o
On 03/14/2017 06:08 AM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-03-12 15:09, 7v5w7go9ub0o wrote: On 03/12/2017 12:45 PM, Andrew David Wong wrote: On 2017-03-11 19:41, Unman wrote: On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote: On 03/

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread Chris Laprise
On 03/14/2017 12:57 PM, cooloutac wrote: yes I agree having to click yes in a dom0 popup will not be cumbersome for most. But is it that easy for the devs to implement? Its already there, for a long time now. The vm-sudo doc describes how to enable it. -- Chris Laprise, tas...@openmailbox

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread Chris Laprise
On 03/14/2017 09:13 AM, sm8ax1 wrote: I still haven't heard any rebuttals against how sudo can help mitigate attacks against the virtualization (persistence aside). Without sudo, unprivileged processes can access /proc/xen/privcmd, raw sockets, memory mappings, etc., and load kernel modules tha

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread cooloutac
On Tuesday, March 14, 2017 at 9:45:23 AM UTC-4, sm8ax1 wrote: > sm8ax1: > > Andrew David Wong: > >> On 2017-03-13 22:09, Chris Laprise wrote: > >>> On 03/12/2017 06:09 PM, 7v5w7go9ub0o wrote: > On 03/12/2017 12:45 PM, Andrew David Wong wrote: > > On 2017-03-11 19:41, Unman wrote: > >>

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread sm8ax1
sm8ax1: > Andrew David Wong: >> On 2017-03-13 22:09, Chris Laprise wrote: >>> On 03/12/2017 06:09 PM, 7v5w7go9ub0o wrote: On 03/12/2017 12:45 PM, Andrew David Wong wrote: > On 2017-03-11 19:41, Unman wrote: >> On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise >> wrote: >>

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-14 Thread sm8ax1
Andrew David Wong: > On 2017-03-13 22:09, Chris Laprise wrote: >> On 03/12/2017 06:09 PM, 7v5w7go9ub0o wrote: >>> On 03/12/2017 12:45 PM, Andrew David Wong wrote: On 2017-03-11 19:41, Unman wrote: > On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise > wrote: >> On 03/11/2017 1

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-03-13 22:09, Chris Laprise wrote: > On 03/12/2017 06:09 PM, 7v5w7go9ub0o wrote: >> On 03/12/2017 12:45 PM, Andrew David Wong wrote: >>> On 2017-03-11 19:41, Unman wrote: On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote:

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-03-12 15:09, 7v5w7go9ub0o wrote: > On 03/12/2017 12:45 PM, Andrew David Wong wrote: >> On 2017-03-11 19:41, Unman wrote: >>> On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote: On 03/11/2017 11:56 AM, Unman wrote: > On Sat

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-13 Thread Chris Laprise
On 03/12/2017 06:09 PM, 7v5w7go9ub0o wrote: On 03/12/2017 12:45 PM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-03-11 19:41, Unman wrote: On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote: On 03/11/2017 11:56 AM, Unman wrote: On Sat, Mar 11,

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-12 Thread 7v5w7go9ub0o
On 03/12/2017 12:45 PM, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2017-03-11 19:41, Unman wrote: >> On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote: >>> On 03/11/2017 11:56 AM, Unman wrote: On Sat, Mar 11, 2017 at 04:43:41PM +, sm8a

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-12 Thread 7v5w7go9ub0o
On 03/12/2017 12:45 PM, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2017-03-11 19:41, Unman wrote: >> On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote: >>> On 03/11/2017 11:56 AM, Unman wrote: On Sat, Mar 11, 2017 at 04:43:41PM +, sm8a

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-12 Thread cooloutac
On Saturday, March 11, 2017 at 11:13:43 PM UTC-5, Chris Laprise wrote: > On 03/11/2017 09:49 PM, cooloutac wrote: > > > Also what does Joanna mean by this statement on that page? " At the > > same time allowing for easy user-to-root escalation in a VM is simply > > convenient for users, especiall

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-12 Thread sm8ax1
Unman: > On Sat, Mar 11, 2017 at 04:43:41PM +, sm8ax1 wrote: >> 7v5w7go9ub0o: >>> >>> >>> On 03/11/2017 12:10 PM, Alex wrote: On 03/11/2017 12:14 PM, Chris Laprise wrote: > On 03/11/2017 04:20 AM, Alex wrote: >> the only really read-write directories (their changes are >> actu

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-12 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-03-11 19:41, Unman wrote: > On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote: >> On 03/11/2017 11:56 AM, Unman wrote: >>> On Sat, Mar 11, 2017 at 04:43:41PM +, sm8ax1 wrote: 7v5w7go9ub0o: >> > > Yep! And ISTM t

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Chris Laprise
On 03/11/2017 09:49 PM, cooloutac wrote: Also what does Joanna mean by this statement on that page? " At the same time allowing for easy user-to-root escalation in a VM is simply convenient for users, especially for update installation." The statement was originally written a long time ago. Q

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Unman
On Sat, Mar 11, 2017 at 08:47:05PM -0500, Chris Laprise wrote: > On 03/11/2017 11:56 AM, Unman wrote: > >On Sat, Mar 11, 2017 at 04:43:41PM +, sm8ax1 wrote: > >>7v5w7go9ub0o: > > >>> > >>>Yep! And ISTM this is an argument for using dispvms to handle mail > >>>(or any other WAN-exposed client/s

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread cooloutac
On Saturday, March 11, 2017 at 8:48:27 PM UTC-5, Chris Laprise wrote: > On 03/11/2017 10:50 AM, cooloutac wrote: > > I have always felt any level of security is useful no matter how trivial to > > bypass. > > > > But I think the decision here for passwordless sudo is not cause privilege > > escal

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Chris Laprise
On 03/11/2017 10:50 AM, cooloutac wrote: I have always felt any level of security is useful no matter how trivial to bypass. But I think the decision here for passwordless sudo is not cause privilege escalation or non root persistence is trivial. Its because people like my mother are not gon

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Chris Laprise
On 03/11/2017 11:56 AM, Unman wrote: On Sat, Mar 11, 2017 at 04:43:41PM +, sm8ax1 wrote: 7v5w7go9ub0o: Yep! And ISTM this is an argument for using dispvms to handle mail (or any other WAN-exposed client/server): start a dispvm; copy mail client and mail "file" into it; do your mail; copy

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Chris Laprise
On 03/11/2017 12:15 PM, Unman wrote: The answer to this is encouraging users to make good use of isolation, qube use and Qubes features. That isnt irresponsible. It's a way of dealing with the problem. I think you would need to develop a much more detailed argument to convince me that the answe

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread cooloutac
I usually just assume I'm protecting against randoms, not some super persistent personal target I can't defend against anyways. So you always have to weigh the efforts. I hate to use the phrase threat model cause when it pertains to attackers there is no such thing. Everything is in it so the

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Unman
On Sat, Mar 11, 2017 at 08:49:10AM -0500, Chris Laprise wrote: > On 03/11/2017 08:10 AM, Unman wrote: > > > > >Anyway, it's a argument that could go on. I dont agree that "the > >chance for improved security comes for free". It's absolutely clear that > >Qubes aims to balance security with usabili

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Unman
On Sat, Mar 11, 2017 at 04:43:41PM +, sm8ax1 wrote: > 7v5w7go9ub0o: > > > > > > On 03/11/2017 12:10 PM, Alex wrote: > >> On 03/11/2017 12:14 PM, Chris Laprise wrote: > >>> On 03/11/2017 04:20 AM, Alex wrote: > the only really read-write directories (their changes are > actually per

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread sm8ax1
7v5w7go9ub0o: > > > On 03/11/2017 12:10 PM, Alex wrote: >> On 03/11/2017 12:14 PM, Chris Laprise wrote: >>> On 03/11/2017 04:20 AM, Alex wrote: the only really read-write directories (their changes are actually persisted) are /home and /usr/local. >>> That is enough to be able to persi

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread cooloutac
On Saturday, March 11, 2017 at 8:51:05 AM UTC-5, Chris Laprise wrote: > On 03/11/2017 08:10 AM, Unman wrote: > > If it means a less attractive environment for script kiddies to raise > hell--- chewing up resources, attacking other computers, creating > footholds for more advanced threats--- then

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread sm8ax1
hib0...@gmail.com: > This part of the file system is not rewritten on every boot. Are you > constantly somehow verifying your VM every boot, every 5 minutes, every web > page load? Or are you restoring from a backup every boot or worse rebuilding > the entire VM from a template every time you n

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread cooloutac
I have always felt any level of security is useful no matter how trivial to bypass. But I think the decision here for passwordless sudo is not cause privilege escalation or non root persistence is trivial. Its because people like my mother are not gonna constantly type their password in dozens

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread 7v5w7go9ub0o
On 03/11/2017 12:10 PM, Alex wrote: > On 03/11/2017 12:14 PM, Chris Laprise wrote: >> On 03/11/2017 04:20 AM, Alex wrote: >>> the only really read-write directories (their changes are actually >>> persisted) are /home and /usr/local. >> That is enough to be able to persist. > Yes, and that doesn'

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Chris Laprise
On 03/11/2017 08:10 AM, Unman wrote: Anyway, it's a argument that could go on. I dont agree that "the chance for improved security comes for free". It's absolutely clear that Qubes aims to balance security with usability - some of the compromises that have been made seem wrong to me, this isnt

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Unman
On Sat, Mar 11, 2017 at 01:10:08PM +0100, Alex wrote: > On 03/11/2017 12:14 PM, Chris Laprise wrote: > > On 03/11/2017 04:20 AM, Alex wrote: > >> the only really read-write directories (their changes are actually > >> persisted) are /home and /usr/local. > > > > That is enough to be able to persis

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Chris Laprise
On 03/11/2017 07:10 AM, Alex wrote: On 03/11/2017 12:14 PM, Chris Laprise wrote: On 03/11/2017 04:20 AM, Alex wrote: the only really read-write directories (their changes are actually persisted) are /home and /usr/local. That is enough to be able to persist. Yes, and that doesn't even need r

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Alex
On 03/11/2017 12:14 PM, Chris Laprise wrote: > On 03/11/2017 04:20 AM, Alex wrote: >> the only really read-write directories (their changes are actually >> persisted) are /home and /usr/local. > > That is enough to be able to persist. Yes, and that doesn't even need root :) So, both having root or

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Chris Laprise
On 03/11/2017 04:20 AM, Alex wrote: the only really read-write directories (their changes are actually persisted) are /home and /usr/local. That is enough to be able to persist. As the others already stated there could be problems for the actually running session, i.e. the rogue command coul

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-11 Thread Alex
On 03/11/2017 12:33 AM, hib0...@gmail.com wrote: > Im sure this has been kicked into a pulp (considering the threads and > the text in the sudoers files) but I am still perturbed by the > argument that allowing unrestricted sudo to root in a DomU VM is > "safe" and there is "no benefit" to disallow

Re: [qubes-users] Kicking the sudoers dead horse

2017-03-10 Thread Chris Laprise
On 03/10/2017 06:33 PM, hib0...@gmail.com wrote: Im sure this has been kicked into a pulp (considering the threads and the text in the sudoers files) but I am still perturbed by the argument that allowing unrestricted sudo to root in a DomU VM is "safe" and there is "no benefit" to disallowing

[qubes-users] Kicking the sudoers dead horse

2017-03-10 Thread hib0x13
Im sure this has been kicked into a pulp (considering the threads and the text in the sudoers files) but I am still perturbed by the argument that allowing unrestricted sudo to root in a DomU VM is "safe" and there is "no benefit" to disallowing it. Perhaps I am misunderstanding something, I ha