| ▲ | charcircuit 20 hours ago |
| The remote daemon has its own account and is given a privilege that allows it to connect a network socket to a pseudo terminal. |
|
| ▲ | direwolf20 20 hours ago | parent | next [-] |
| Those are already unprivileged operations, but how does it start the initial process in that terminal with the correct privileges for a different user? |
| |
|
| ▲ | esseph 20 hours ago | parent | prev [-] |
| Any breach of the daemon will still give access to a system that can approve/deny user logins. Breaching the daemon therefore allows permission escalation, because you can simply jump to an account. Chain with any local vuln of your choice to completely own the box. It doesn't matter what user it is running as. If this was so easy to deal with, someone would have done it. Instead, we get endless HN comments about people that act like they can do better but never submit a PR. |
| |
| ▲ | charcircuit 19 hours ago | parent [-] | | Breaching the daemon only allows for the attacker to get access to the login. User accounts should still be secured requiring authentication. >If this was so easy to deal with, someone would have done it. Sadly this is not the case. There is a lot of inertia towards solutions like ssh or sudo. It may be easy to delete them, but actually getting such a changed accepted is no trivial task. | | |
| ▲ | esseph 19 hours ago | parent [-] | | > Breaching the daemon only allows for the attacker to get access to the login Yes, but potentially any login. See the problem? If you compromise the gatekeeper, you are now the keymaster. Or whatever :) | | |
| ▲ | charcircuit 17 hours ago | parent [-] | | I'll admit it is still problematic. But at least there is only 1 gatekeeper instead of 2. | | |
| ▲ | jmb99 16 hours ago | parent [-] | | How is that better? | | |
| ▲ | charcircuit an hour ago | parent [-] | | You can focus all of your energy into strengthening and testing a single point of the system instead of having to do it for many. | | |
| ▲ | esseph 14 minutes ago | parent [-] | | You're grasping for straws a bit here. This is already done for ssh as the defacto remote access mechanism for a very long time. |
|
|
|
|
|
|