| ▲ | subscribed 3 days ago |
| Okay, but it's very easy for you to build and sign your own builds that provide root access to the user. I dint understand why you insist on this massive risk to be laid on on everyone. GOS publishes pretty detailed documentation. They don't explain step by step how to build an OS with root specifically, instead assuming that the users knowing the immense risks also have the skils they need to achieve it without handholding. |
|
| ▲ | yjftsjthsd-h 3 days ago | parent | next [-] |
| > Okay, but it's very easy for you to build and sign your own builds that provide root access to the user. > GOS publishes pretty detailed documentation. They don't explain step by step how to build an OS with root specifically, instead assuming that the users knowing the immense risks also have the skils they need to achieve it without handholding. It really sounds like you call it very easy, then promptly turn around and say that it's not easy but that's okay because it should be hard. You're also conflating the ability to assess security risks with the ability to build Android from source and modify it in the process, even though these skills are mostly unrelated. > I dint understand why you insist on this massive risk to be laid on on everyone. Largely, I don't agree that it's a "massive risk" in the first place. I don't believe that user-controlled root access is a problem, and I certainly don't believe that a default-off option to enable root access constitutes a problem. |
| |
| ▲ | subscribed 3 days ago | parent [-] | | No, it is very easy. You either build a debug image, so you just have it, or you add your own patches adding this capability (in exactly the same way the project modifies stock aosp), and build it. Use your own keys to sign and you're golden. The assumption is you know what you're doing, and then it's very easy. If you don't, then you likely shouldn't. I am not really "conflating" these in a way you suggest: it's not just about building the image but deeper understanding that will bring both. It's not disconnected from the project, but it's inherently within the project. SURE you can consider these two separate skills, but within the context of "getting the root on the GOS build" it's one. If you don't know how to make it happen, you don't have a skill to safely use it. And lastly, it's okay if you don't consider it a massive risk. I do. Now let's consider the risks of that,
- https://cybernews.com/security/rooted-android-ios-devices-su...
- https://www.talsec.app/blog/what-is-rooting-and-how-to-prote... For you it's not a risk, okay, I guess. I mean, if you're a security researcher with a considerable reputation, you can certainly argue with authority, but I don't see the angle. You argue from the position of convenience and capabilities. Is the risk high? The consensus is that it is. I agree, you don't, I'm okay with it. | | |
| ▲ | yjftsjthsd-h 2 days ago | parent [-] | | > You either build a debug image, so you just have it, It is my understanding that that only gives root to adb, not apps, so no. > or you add your own patches adding this capability (in exactly the same way the project modifies stock aosp), and build it. If we're at the point of patching source trees, then no, we've left the realm of "very easy" behind. Installing Magisk is easy. Building Android from source, let alone patching it, is not. > It's not disconnected from the project, but it's inherently within the project. SURE you can consider these two separate skills, but within the context of "getting the root on the GOS build" it's one. If you don't know how to make it happen, you don't have a skill to safely use it. I really disagree. Knowing when to click the allow button or not is a separate skill from building/patching a ROM from source. > Now let's consider the risks of that, - https://cybernews.com/security/rooted-android-ios-devices-su... - https://www.talsec.app/blog/what-is-rooting-and-how-to-prote... I'd love to, but you'll have to mention what they might be. Both of those links treat root as nearly synonymous with compromise but never bother to explain how that compromise would occur, just 1. root 2. ??? 3. malware. That's fear-mongering, not a threat model. > I mean, if you're a security researcher with a considerable reputation, you can certainly argue with authority, but I don't see the angle. Or, we could avoid Appeal to Authority and talk threat models. The only one I've seen yet in this thread is people claiming that malware can fake out permission dialogs and that this is a problem for root permissions but somehow leaves the rest of Android's permission model in a usable state, which is... an interesting claim. > Is the risk high? The consensus is that it is. I agree, you don't, I'm okay with it. Many people making vague claims might technically be a "consensus" but it's not actually meaningful. If you've got an actual threat model, let's hear it, otherwise there's not much point to this. | | |
| ▲ | gradeless 20 hours ago | parent | next [-] | | Theres been a consistent pattern of both low quality and advanced malware looking for and targeting the weakness introduced by rooting a device. Here is a recent report of widespread advanced malware looking to see if a device is rooted - https://www.lookout.com/threat-intelligence/article/badbazaa... Here is a report of malware using root -
https://zimperium.com/blog/new-advanced-android-malware-posi... Root does not only provide privilege escalation, it also provides attractive options for exploit persistence on a device, something which is difficult to achieve on modern Android and iOS. | | |
| ▲ | yjftsjthsd-h 14 hours ago | parent [-] | | > Here is a recent report of widespread advanced malware looking to see if a device is rooted Okay? I do actually think that should be blocked (good root is invisible), but I'm not seeing a problem. > Here is a report of malware using root To quote the article: > In addition to collecting the messages using the Accessibility Services, if root access is available, the spyware steals the WhatsApp database files by copying them from WhatsApp’s private storage. Note that it already uses a11y features to do the same thing regardless, but also this is another case of conveniently skipping all the important details. Seriously - "if root access is available, the spyware steals" - how did it get root access? If the "vulnerability" is that the malware asks the user for root access and the user gives it, that is not a vulnerability. A system where malware needs permission to do bad things is perfectly fine. |
| |
| ▲ | Scrubbed4426 a day ago | parent | prev [-] | | Root does not leave the Android permission model in a usable state at all, it completely undermines it. You are moving from a small handful of processes that get root access and are heavily constrained by selinux policies and are nowhere near userspace to putting root access behind a weak UI prompt. That is the ability to modify the system at runtime. If the system can be modified and the bar to that modification is trivially bypass-able, privilege escalation becomes monumentally easier for an attacker. Because the system can be modified *it cannot be trusted*. |
|
|
|
|
| ▲ | jampekka 3 days ago | parent | prev | next [-] |
| If the risks are so immense, surely we shouldn't be allowed root on our laptops either? |
| |
| ▲ | bornfreddy 3 days ago | parent | next [-] | | Pssst, quiet, don't give them any ideas... :-/ | |
| ▲ | codethief 3 days ago | parent | prev | next [-] | | From a security point of view that would be a good idea, or at least making sure you don't need root for everyday tasks. Requiring root to, e.g., install & configure applications is a huge antipattern IMO. | | |
| ▲ | jampekka 3 days ago | parent | next [-] | | Android of course requires root for installing and configuring applications. It just grants the root automatically. | | |
| ▲ | strcat 2 days ago | parent | next [-] | | No, it doesn't. Only a few very core system processes run as root and even those are contained quite a bit via SELinux. The application layer of the OS including installing apps does not run as root or with equivalent access. | |
| ▲ | oneshtein 3 days ago | parent | prev [-] | | Developers cannot trust a random phone «owner». |
| |
| ▲ | fsflover 3 days ago | parent | prev [-] | | Have a look at https://qubes-os.org to understand why you're mistaken. | | |
| ▲ | codethief 2 days ago | parent [-] | | I know Qubes. I meant "requiring root to, e.g., install & configure applications is a huge antipattern" on standard Linux distributions, where most people just use sudo in their usual shell, so an attacker merely needs to take over a non-root user account (and their .bashrc) to get root. | | |
| ▲ | fsflover 2 days ago | parent [-] | | > so an attacker merely needs to take over a non-root user account (and their .bashrc) to get root So if I don't use sudo then the problem with root is solved? |
|
|
| |
| ▲ | subscribed 2 days ago | parent | prev | next [-] | | And there's reason why normal windows / Linux laptops are less secure. Look, if your media player or game can just steal your ssh keys, or slightly modify your changes to your code, or inject a script into your startup sequence, that's not very safe, is it? And that's even without having access to root (imagine if someone had written a malware like Heartbleed or Shellshock, which then could quietly persist, patch your firmware, or actually do anything it wants?) I hope you're at least running your laptop with selinux in enforcing mode :) | | |
| ▲ | yellowapple 2 days ago | parent | next [-] | | > Look, if your media player or game can just steal your ssh keys, or slightly modify your changes to your code, or inject a script into your startup sequence, that's not very safe, is it? The availability of application sandboxen and the availability of root access are two entirely separate security concerns. | | |
| ▲ | yupyupyups 2 days ago | parent [-] | | Someone can correct me if I'm wrong. If the GUI stack is vulnerable, then those sandboxes could be broken out of. The idea behind not allowing an app to access root is to remove the attack surface introduced by the GUI stack. An alternative interface to a GUI would be some physical connection (like usb-c). So accessing root exclusively via a console port or USB would be safer in theory. This is true regardless if it's a phone or a PC. Desktops are unfortunately waaaay behind something like GrapheneOS or iOS in terms of sandboxing. The closest in the desktop world is Qubes OS, but that's not a realistic alternative to normal OSes for the common user. | | |
| ▲ | jampekka 2 days ago | parent [-] | | Running GUI programs as root has been discouraged more or less always. Nowadays GUI programs that need root request it, via e.g. PolicyKit, for the specific operations it is needed. I very much don't want to have some external device to have root access to my computer. If iOS type sandboxing where I can't access most of the data at all is ahead, I'm glad to be behind. |
|
| |
| ▲ | jampekka 2 days ago | parent | prev [-] | | I'm willing to take the very slight chance of getting compromised in exchange for getting things done. |
| |
| ▲ | paulhart 3 days ago | parent | prev | next [-] | | That's a Chromebook, no? | | | |
| ▲ | ajjahs 3 days ago | parent | prev [-] | | [dead] |
|
|
| ▲ | sfdlkj3jk342a 3 days ago | parent | prev | next [-] |
| They actually do include how to do it in their official build guide. Just change the build target from -user to -userdebug. All other steps remain the same. That will give you adb root access. |
| |
| ▲ | yjftsjthsd-h 3 days ago | parent [-] | | > That will give you adb root access. I don't want adb root access? I want to be able to run apps with root access. |
|
|
| ▲ | fsflover 3 days ago | parent | prev [-] |
| > massive risk Are you saying that the Qubes OS security model is worse than the GrapheneOS one? |
| |
| ▲ | IlikeKitties 3 days ago | parent | next [-] | | It's a different approach to compartmentalization and the security risk of root in Grapheneos is different to that in QubesOS. But you know this looking at your bio, you just chose to ignore it. | | |
| ▲ | fsflover 3 days ago | parent [-] | | Can you elaborate on the differences in the compartmentalization? When the existence of root is equivalent to a broken security, it doesn't look secure to me at all. Are you talking about the security from the user? By the way, personal attacks are against the HN Guidelines. | | |
| ▲ | IlikeKitties 2 days ago | parent [-] | | Ah yes thats a real good faith argument you got there. GrapheneOS is designed so you don’t need root to run apps or manage the device. Compartmentalization is on an per app level. And you already know how qubes does compartmentalisation. | | |
| ▲ | strcat 2 days ago | parent [-] | | Sandboxing is on a per-app level but those sandboxed apps can be hooked up to different profiles. The Linux kernel is the main weakness of the current app sandboxing along with system services to a lesser extent. Running apps or groups of apps within virtual machines is definitely part of what GrapheneOS working on. There's already hardware-based virtualization integration but it really needs native GPU virtualization support to be fully usable for GUI usage without relying on proxying GPU commands to the host OS. Pixel 10 is the first device with this, but it will take us some time to support the 10th gen Pixels and our focus is going to be more on Snapdragon devices and their Gunyah hypervisor soon due to our OEM partnership. | | |
| ▲ | fsflover 2 days ago | parent [-] | | > Running apps or groups of apps within virtual machines is definitely part of what GrapheneOS working on This sounds like a great news to me, thank you. |
|
|
|
| |
| ▲ | subscribed 3 days ago | parent | prev [-] | | Non sequitur? GOS is not running a flavour of mainline Linux, but Android.
They're nevertheless planning on moving to virtualisation as well https://discuss.grapheneos.org/d/24154-grapheneoss-roadmap-r... For now it's as good as it gets. | | |
| ▲ | strcat 2 days ago | parent [-] | | Linux doesn't mean systemd, GNU coreutils, glibc, GCC, GNU binutils, GNOME, etc. GrapheneOS is a Linux distribution and supports the Linux 6.1, 6.6 or 6.12 LTS branches. 6.12 is the latest LTS branch. Using Linux is a pragmatic thing, not a positive one for privacy or security. A huge monolithic kernel written in C is not the future for a highly secure OS. Moving away from the Linux kernel is important. QubesOS exists as a workaround for the insecurity of Linux. If the OS was using a highly secure microkernel in the first place, their hardware virtualization approach wouldn't be needed. | | |
| ▲ | fsflover 2 days ago | parent [-] | | > If the OS was using a highly secure microkernel in the first place, their hardware virtualization approach wouldn't be needed. Do you have any statistics to show about how secure a micro-kernel is? I can't believe it can be better than this: https://www.qubes-os.org/security/qsb/ |
|
|
|