cve-2021-3156 heap overflow in sudo. roughly 10 years long in sudo. Allowed privilege escalation. It was huge.
- 0 Posts
- 24 Comments
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
44·8 months agoThere are many ways to harden against it, but “just disable root auth” is not really it, since it in itself does not add much.
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
45·8 months agoNo you can alias that command and hijack the password promt via bashrc and then you have the root password as soon as the user enters it.
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
46·8 months agoWith aliases in the bashrc you can hijack any command and execute instead of the command any arbitrary commands. So the command can be extracted, as already stated above, this is not a weakness of sudo but a general one.
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
36·8 months agoAnd how would you not be able to hijack the password when you have control over the user session?
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
45·8 months agoAnd what do you suggest to use otherwise to maintain a server? I am not aware of a solution that would help here? As an attacker you could easily alias any command or even start a modified shell that logs ever keystroke and simulates the default bash/zsh or whatever.
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
148·8 months agoThe scenario OC stated is that if the attacker has access to the user on the server then the attacker would still need the sudo password in order to get root privileges, contrary to direct root login where the attack has direct access to root privileges.
So, now i am looking into this scenario where the attack is on the server with the user privileges: the attacker now modifies for example the bashrc to alias sudo to extract the password once the user runs sudo.
So the sudo password does not have any meaningful protection, other then maybe adding a time variable which is when the user accesses the server and runs sudo
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
109·8 months agoThe attacker that is currently with user privileges on the server?
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
55·8 months agoMost comments here suggest 3 things
- least privilege: Which is ok, but on a Server any modification you do requires root anyway, there is usually very little benefit
- Additional protection through required sudo password: This is for example easily circumvented by modifying the bashrc or similar with an sudo alias to get the password
- Multiuser & audittrails: yes this is a valid point, on a system that is modified or administered by multiple ppl there are various reasons lime access logging and UAC for that
An actual person from the pen testing world: https://youtu.be/fKuqYQdqRIs
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
618·8 months agoThe sudo password can be easily extracted by modifying the bashrc.
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?
622·8 months agoNope, not really. The only reason ppl recommend it is, because “you have then to guess the username too”. Which is just not relevant if you use strong authentication method like keys or only strong passwords.
Either you are heavily misinformed about how difficult arch is, or you lack any confidence in your ‘Linux skill’.
Choose the system you want to achieve, follow the wiki and choose the software you want to use using it and you are good to go, it really is not that hard. You can always use archinstall.
Tbf, winget is a god sent and works surprisingly well, took them what? 30 years to get it done?!
Just today I logged into a Workstation at work, just to see 2 versions of Teams being auto launched. And no, no one installed 2 Versions, it was Windows.
Yep. The difference is simply put just ppl are used to the quirks on Windows but not on Linux.
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Linux Mint - NOT "Usable Out of the Box" - Probably switching back to Windows
1·9 months agoIf I decide to put up with this type of attitude
Your the one insulting me.
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Linux Mint - NOT "Usable Out of the Box" - Probably switching back to Windows
1·9 months agoWould you say pointing the finger at the linux devs and maintainers saying they should work harder does improve anything and drives ppl to volunteer?
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Linux Mint - NOT "Usable Out of the Box" - Probably switching back to Windows
2·9 months agoMaybe you should take a read on Wikipedia on what gatekeeping is before you insult me. https://en.m.wikipedia.org/wiki/Gatekeeping_(communication)
ShortN0te@lemmy.mlto
Linux@lemmy.ml•Linux Mint - NOT "Usable Out of the Box" - Probably switching back to Windows
1·9 months agoOC stated those things ‘should be worked on’. What else is it than blaming ppl?
Yes things could be better, but saying things should be better while sitting on their ass and doing nothing is just not correct to say. If you say it should be better then you should take part in it getting better.
Yes. There are enough signed and exploitable Windows Boot loader which you can use to boot anything you want.