Security problems with sudo

Thiago Macieira thiago at kde.org
Sun May 17 14:42:36 BST 2009


John Tapsell wrote:
>2009/5/17 Thiago Macieira <thiago at kde.org>:
>> John Tapsell wrote:
>>>2009/5/17 Thiago Macieira <thiago at kde.org>:
>>>> John Tapsell wrote:
>>>>>  Now the question is..  is there any way to protected against this?
>>>>
>>>> No. If your environment is already infected, your using of sudo
>>>> gives the privilege elevation.
>>>>
>>>> If you want to protect against that, don't elevate privileges using
>>>> sudo. Use ssh -Y.
>>>
>>>How would that work?  If you run ssh locally, you have the same
>>>problems.  A program could simply run a key logger.  If you run
>>>remotely but ssh in as the user first, then you have the same problem.
>>> If you run remotely and ssh in directly as root, then that goes
>>>against the usual restriction to prevent remote root login.
>>
>> I think ssh-askpass grabs the keyboard, which means it won't work if
>> something else grabbed the keyboard.
>
>Okay so the evil problem simply supplies their own ssh-askpass
>program, installed to the users home directory, and modifies .bashrc
>to add that directory to the front of the path.

I think ssh is a bit more intelligent than that.

-- 
  Thiago Macieira  -  thiago (AT) macieira.info - thiago (AT) kde.org
    PGP/GPG: 0x6EF45358; fingerprint:
    E067 918B B660 DBD1 105C  966C 33F5 F005 6EF4 5358
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part.
URL: <http://mail.kde.org/pipermail/kde-core-devel/attachments/20090517/5e6ac656/attachment.sig>


More information about the kde-core-devel mailing list