72

Almost every program that we run has access to the environment, so nothing stops them from curling our credentials to some nefarious server.

Why don't we put credentials in files and then pass them to the programs that need them? Maybe coupled with some mechanism that prevents executables from reading any random file except those approved.

you are viewing a single comment's thread
view the rest of the comments
[-] cizra@lemm.ee 70 points 10 months ago

Environments are per-process. Every program can have its own environment, so don't inject secrets where they're not needed.

I'm using bubblewrap to restrict access to FS.

[-] cybersandwich@lemmy.world 36 points 10 months ago

I am not familiar with the software bubblewrap so I am just picturing your hard drives wrapped up inside your case.

[-] GlitchyDigiBun@lemmy.dbzer0.com 29 points 10 months ago

That's an old white-hat trick. If the tables drop, the wrap helps them bounce.

[-] ReversalHatchery@beehaw.org 21 points 10 months ago* (last edited 10 months ago)

The environment of other processes is readable in procfs.

/proc/PID/environ

Thanks to the permissions it's read-only, and only by the user with which the process runs, but it's still bad, I think

[-] Lojcs@lemm.ee 7 points 10 months ago

Don't all programs run as the user anyways? That changes nothing on a single user machine

[-] hansl@lemmy.ml 15 points 10 months ago

A proper server should have one user per service.

[-] PuppyOSAndCoffee@lemmy.ml 0 points 10 months ago
[-] fahfahfahfah@lemmy.billiam.net 7 points 10 months ago

Service users generally don’t have passwords

[-] lemmyvore@feddit.nl 3 points 10 months ago

You don't login as service users, they're just a means of taking advantage of the user separation features. They have the login shell set to /bin/false typically.

[-] yum13241@lemm.ee 2 points 10 months ago
[-] russjr08@outpost.zeuslink.net 3 points 10 months ago

From a quick search I've just done, the major difference is that /bin/false can't return any text, the only thing it can do as specified via POSIX standards is return false.

So if you set someone's shell to /bin/nologin there can be some text that says "You're not allowed shell access", similar to what happens if you try to SSH into say GitHub.

Of course, for a service account that won't be operated by a person, that doesn't matter - so whichever one you use is just whichever the operator thought of first, most likely.

[-] PuppyOSAndCoffee@lemmy.ml 1 points 10 months ago

true dat; false trends to CVE vs nologin

[-] 30p87@feddit.de 4 points 10 months ago

Some have their own users, like gitlab

this post was submitted on 18 Aug 2023
72 points (91.9% liked)

Linux

45574 readers
697 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS