home.social

#run0 — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #run0, aggregated by home.social.

  1. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  2. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  3. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  4. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  5. While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

    Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

    Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

    I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

    ```nix
    boot.blacklistedKernelModules = [
    "algif_aead"
    ];

    security.sudo.enable = false;

    security.wrappers = {
    su.enable = false;
    pkexec.enable = false;

    # example setuid binary
    chsh = {
    source = "${pkgs.shadow}/bin/chsh";
    setuid = lib.mkForce false;
    owner = "root";
    group = "root";
    };
    };
    ```

  6. This week's Cockpit release adds a systemd/polkit-based superuser authentication (think `run0`) as a fallback when sudo is not available/broken. It also finally removes the long-deprecated pam_cockpit_cert module.

    cockpit-project.org/blog/cockp

    #cockpit #release #run0

  7. This week's Cockpit release adds a systemd/polkit-based superuser authentication (think `run0`) as a fallback when sudo is not available/broken. It also finally removes the long-deprecated pam_cockpit_cert module.

    cockpit-project.org/blog/cockp

  8. This week's Cockpit release adds a systemd/polkit-based superuser authentication (think `run0`) as a fallback when sudo is not available/broken. It also finally removes the long-deprecated pam_cockpit_cert module.

    cockpit-project.org/blog/cockp

    #cockpit #release #run0

  9. This week's Cockpit release adds a systemd/polkit-based superuser authentication (think `run0`) as a fallback when sudo is not available/broken. It also finally removes the long-deprecated pam_cockpit_cert module.

    cockpit-project.org/blog/cockp

    #cockpit #release #run0

  10. This week's Cockpit release adds a systemd/polkit-based superuser authentication (think `run0`) as a fallback when sudo is not available/broken. It also finally removes the long-deprecated pam_cockpit_cert module.

    cockpit-project.org/blog/cockp

    #cockpit #release #run0

  11. Dumb thought (putting it here so that I don't forget :P)

    does run0 allow to switch to nobody for non root users?

    Using "sudo su - nobody -s /bin/sh" is kinda a bit annoying :p

    #sudo #su #nobody #Linux #run0

  12. Dumb thought (putting it here so that I don't forget :P)

    does run0 allow to switch to nobody for non root users?

    Using "sudo su - nobody -s /bin/sh" is kinda a bit annoying :p

    #sudo #su #nobody #Linux #run0

  13. Dumb thought (putting it here so that I don't forget :P)

    does run0 allow to switch to nobody for non root users?

    Using "sudo su - nobody -s /bin/sh" is kinda a bit annoying :p

    #sudo #su #nobody #Linux #run0

  14. Dumb thought (putting it here so that I don't forget :P)

    does run0 allow to switch to nobody for non root users?

    Using "sudo su - nobody -s /bin/sh" is kinda a bit annoying :p

    #sudo #su #nobody #Linux #run0

  15. Dumb thought (putting it here so that I don't forget :P)

    does run0 allow to switch to nobody for non root users?

    Using "sudo su - nobody -s /bin/sh" is kinda a bit annoying :p

    #sudo #su #nobody #Linux #run0

  16. engang for hundre år siden, da jeg først begynte med #Linux, så var liksom ikke #sudo en greie. Og så ble det det, og en del av oss himlet litt med øynene av "sudo su" og sånt, men så ble det etter hvert ganske vanlig.

    Men mellom det @pid_eins har skravlet om rundt #run0, og @trifectatech sin #sudors, så er det kanskje på tide å gå tilbake til å ikke ha vanilla sudo på maskina igjen?

    stratascale.com/vulnerability-

  17. engang for hundre år siden, da jeg først begynte med #Linux, så var liksom ikke #sudo en greie. Og så ble det det, og en del av oss himlet litt med øynene av "sudo su" og sånt, men så ble det etter hvert ganske vanlig.

    Men mellom det @pid_eins har skravlet om rundt #run0, og @trifectatech sin #sudors, så er det kanskje på tide å gå tilbake til å ikke ha vanilla sudo på maskina igjen?

    stratascale.com/vulnerability-

  18. engang for hundre år siden, da jeg først begynte med #Linux, så var liksom ikke #sudo en greie. Og så ble det det, og en del av oss himlet litt med øynene av "sudo su" og sånt, men så ble det etter hvert ganske vanlig.

    Men mellom det @pid_eins har skravlet om rundt #run0, og @trifectatech sin #sudors, så er det kanskje på tide å gå tilbake til å ikke ha vanilla sudo på maskina igjen?

    stratascale.com/vulnerability-

  19. engang for hundre år siden, da jeg først begynte med #Linux, så var liksom ikke #sudo en greie. Og så ble det det, og en del av oss himlet litt med øynene av "sudo su" og sånt, men så ble det etter hvert ganske vanlig.

    Men mellom det @pid_eins har skravlet om rundt #run0, og @trifectatech sin #sudors, så er det kanskje på tide å gå tilbake til å ikke ha vanilla sudo på maskina igjen?

    stratascale.com/vulnerability-

  20. engang for hundre år siden, da jeg først begynte med #Linux, så var liksom ikke #sudo en greie. Og så ble det det, og en del av oss himlet litt med øynene av "sudo su" og sånt, men så ble det etter hvert ganske vanlig.

    Men mellom det @pid_eins har skravlet om rundt #run0, og @trifectatech sin #sudors, så er det kanskje på tide å gå tilbake til å ikke ha vanilla sudo på maskina igjen?

    stratascale.com/vulnerability-

  21. The one thing that makes systemd run0 annoying to use is that it'll ask you every time for the password. With sudo you have this 10 minutes where it won't ask again.

    I know the technical reasons, but still this drives me back to sudo.

  22. The one thing that makes systemd run0 annoying to use is that it'll ask you every time for the password. With sudo you have this 10 minutes where it won't ask again.

    I know the technical reasons, but still this drives me back to sudo.

    #systemd #run0 #sudo #Linux

  23. The one thing that makes systemd run0 annoying to use is that it'll ask you every time for the password. With sudo you have this 10 minutes where it won't ask again.

    I know the technical reasons, but still this drives me back to sudo.

    #systemd #run0 #sudo #Linux

  24. The one thing that makes systemd run0 annoying to use is that it'll ask you every time for the password. With sudo you have this 10 minutes where it won't ask again.

    I know the technical reasons, but still this drives me back to sudo.

    #systemd #run0 #sudo #Linux

  25. The one thing that makes systemd run0 annoying to use is that it'll ask you every time for the password. With sudo you have this 10 minutes where it won't ask again.

    I know the technical reasons, but still this drives me back to sudo.

    #systemd #run0 #sudo #Linux

  26. @shuLhan @cazabon Well, based on my experiences with #journald as a #syslog_ng guy, my expectation is that around 5-10 years of security nightmares are about to come with #run0:

    syslog-ng.com/community/b/blog

    Yes, a decade later after journald arrived, I have no problem recommending it. But the first 7-8 years were catastrophic both for users and developers.

  27. @shuLhan @cazabon Well, based on my experiences with as a guy, my expectation is that around 5-10 years of security nightmares are about to come with :

    syslog-ng.com/community/b/blog

    Yes, a decade later after journald arrived, I have no problem recommending it. But the first 7-8 years were catastrophic both for users and developers.

  28. @shuLhan @cazabon Well, based on my experiences with #journald as a #syslog_ng guy, my expectation is that around 5-10 years of security nightmares are about to come with #run0:

    syslog-ng.com/community/b/blog

    Yes, a decade later after journald arrived, I have no problem recommending it. But the first 7-8 years were catastrophic both for users and developers.

  29. @shuLhan @cazabon Well, based on my experiences with #journald as a #syslog_ng guy, my expectation is that around 5-10 years of security nightmares are about to come with #run0:

    syslog-ng.com/community/b/blog

    Yes, a decade later after journald arrived, I have no problem recommending it. But the first 7-8 years were catastrophic both for users and developers.

  30. @shuLhan @cazabon Well, based on my experiences with #journald as a #syslog_ng guy, my expectation is that around 5-10 years of security nightmares are about to come with #run0:

    syslog-ng.com/community/b/blog

    Yes, a decade later after journald arrived, I have no problem recommending it. But the first 7-8 years were catastrophic both for users and developers.