Conversation

a key but often overlooked feature of distributions is that package *removal* is another form of package curation that is largely targeted at harm reduction. maybe i should blog about that someday
2
21
Replying to
Firejail is horrible but unfortunately user namespaces also provide a bunch of low-hanging local root vulnerabilities by exposing substantially more kernel attack surface to anything able to use them. It's important to disallow nearly anything from actually making namespaces.
1
5
A lot of setuid binaries don't take the risk of that poorly designed privilege elevation mechanism seriously and Firejail is definitely one of those. Unfortunately most of the Linux kernel has the same approach to user namespaces. Developers see their code as not attack surface.
1
2
For example, user namespaces allow an unprivileged user to create a network namespace via a user namespace and then manage networking including iptables/nftables rules, etc. Same for mount namespace with mounts, etc. It exposes a huge amount of attack surface not designed for it.
1
2
Similar in some ways to how filesystem developers have historically considered it laughable to avoid trusting the filesystem state despite removable drives and verified boot both being widely used for ages and both depending on this actually being taken seriously.
1
3
At least they've sort of started fixing filesystems but they're still kinda treating it as a joke. Those network APIs are hardly doing that. Perf events are another API that's basically a root elevation system call with a maintainer who considers local security a total joke.
1
1
Show replies