Conversation

no, actually, your SUID program which is "sudo, but written in rust" is not actually "safe" because "memory safety" the primary vulnerability for programs like this is logic errors, which rust can't do anything about on its own.
12
449
Replying to
Admittedly Rust *style* discourages a lot of logic error classes, beyond memory safety issues. But unlike the hard guarantees of memory safety of safe code, there are no such guarantees here, just tools to hopefully encourage people to write better code.
2
65
At any rate I largely agree that magically replacing things isn't the greatest idea. However just because the "primary" problem with a particular class of application isn't directly addressed, that doesn't mean that all the other issues that also affect it are not important.
1
2
Make a user that has access to the functionality and provide access via keys. It shouldn't even be possible to attempt to login to accounts via passwords locally. Normal default when you create a user is that password login is disabled and they can't change it since it's unset.
1
Supposed use case for these tools is on a multi-user server for delegating privileges via CLI command names/syntax. Bad idea. If you're giving access to everything as root, you might as well just be using key-only ssh as root. Can use it via localhost. What does sudo offer?
1
Show replies