• Pantherina@feddit.de
    link
    fedilink
    arrow-up
    5
    arrow-down
    18
    ·
    1 year ago

    I.e. how malware could easily catch your Sudo password without root access.

    Peeps, bad news, Linux is damn insecure.

    By simply placing an alias in your bashrc they could already grab your sudo password.

    Another bad news, this Windows “okay” Button without any password is actually more secure.

    • ShortN0te@lemmy.ml
      link
      fedilink
      arrow-up
      12
      ·
      1 year ago

      I.e. how malware could easily catch your Sudo password without root access.

      Peeps, bad news, Linux is damn insecure.

      By simply placing an alias in your bashrc they could already grab your sudo password.

      Another bad news, this Windows “okay” Button without any password is actually more secure.

      In other words: a compromised system at the User level can easily compromised at the admin level if there are no additional checks/measures in place. Same for Windows. Just change the link to a Programm you commonly need the press OK to to you maleware. Profit.

    • DigitalDilemma@lemmy.ml
      link
      fedilink
      arrow-up
      6
      arrow-down
      2
      ·
      1 year ago

      Either you’re trolling - in which case, sod off back to Reddit - or you have a woeful misunderstanding of how Linux user permissions work.

      Please explain how someone might “simply change” someone else’s .bashrc without either already having access to that user account, or root access on the whole machine?

      • Pantherina@feddit.de
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        Nearly all tools (with flatpak and portals progressing into better directions but probably never finished) have rw permissions everwhere.

        The modern OS threat model is not other users, as private users mostly have single user systems. It is malware and software doing nasty things.

        On Linux this always worked out somehow, but grabbing your sudo password is not hard, just alias sudo to a script reading your argument, reading your password, and piping the password to the real sudo. You dont even notice it but that script just got your sudo password.

        Dont know what Reddit has to do with that

      • ReversalHatchery@beehaw.org
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        It’s not about someone, it’s about something. A lot of us aren’t (only) using Linux as a server OS, but for desktop too, and desktop usage involves running much more different kinds of software that you simply just can’t afford to audit, and at times there are programs that you can’t choose to not use, because it’s not on you but on someone on whom you depend.

        Then it’s not even only that. It’s not only random shit or a game you got that can edit your bashrc and such, but if let’s say there’s a critical vulnerability in a complex software you use, like a web browser, an attacker could make use of that to take over your account with the use of a bashrc alias.