home.social

#pkexec — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #pkexec, aggregated by home.social.

  1. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  2. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  3. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  4. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  5. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```