-
Notifications
You must be signed in to change notification settings - Fork 18
Users can see other's opened sockets through /proc #6
Comments
If this helps I used strace on my debian jessie server first without sudo and then with sudo. I also did a strace on hashbang (obviously without sudo). All gists have been marked as private and I can delete upon request, if needed.
Looking through them, the first thing I noticed was my strace on my local machine has a bunch of permission denied errors, an example follows.
Also, strace on my local server with sudo looks very similar to strace of hashbang. I thought maybe netstat is suid root on hashbang, but it does not appear to be the case. (Edited by Ryan: formatting) |
These just use |
I had a look through those and nothing seems to be delicate.
As a service that hopes to teach sysadmins, we want to have as much visible about the system and how it works as possible. We only hide security sensitive info (i.e. keys+passwords) and information leaks about other user's private data. |
There is nothing to worry about here, you are only seeing information about your own processes. |
I'm confused. There is nothing to worry about what? I am looking at a list of ip addresses of other users that are currently connected both in tcp and tcp6. Most are connected to port 6697 ( i assume irc) but some on 57790, 8333, 35481 ... |
That is from |
Okay. I was just concerned as if I run on my local server without sudo non-owned process info Should I close issue? |
You can just run |
Is this resolved as a minor issue? We are a public service; in my opinion, if you don't want something you're running shown, don't run it using our service. Should we close this? |
That's not fair at all. |
What's the difference between a "shell service" and "shared shell service"? What's the difference between renting a one-bedroom apartment and renting one room in a big house? Having some visibility into the activities of peers is both positive and negative. |
@ChickenNuggers I think we should try, as much as possible, to provide reasonable levels of privacy. In that specific case, I'm unsure what to do: it seems there is no simple way to prevent users from learning about other users' connections. |
Seems that GrSec's On the other hand, that would mean maintaining a custom kernel package for our own use. |
Ping? |
@hashbang/administrators Ping? |
In general, this is a feature I'd like. So, I think I'm just waiting for some other way to accomplish it. (namespaces?) |
Mmmmh, you are right, For the record, I would be in favor of running GrSec, in the mid/long-term. |
Yep. That's one of the things I was playing with over at https://github.com/hashbang/pam_network_namespace |
I have been doing some looking around checking various things to make sure permissions were as they should be, more in regards to leaking user info or world readable files that may contain sensitive info. Still doing more, but I figured I would post this now (really should have a few days ago). Some issues that I found were resolved that day when posted in irc so no need to mention any further, however the following remain.
netstat -antp
netstat -anup
Or any other
netstat
command that I didn't think of that should requiresudo
privileges does notThis of course leads to the leak of users address information as well as showing some open ports on the hashbang server that may have otherwise went unknown that could, possibly be used as information gathering for an attack.
I have also discovered that some logs in /var/log are readable
as well as others.
This also poses the question, should I as a regular user, even have access to the /var/log directory
The text was updated successfully, but these errors were encountered: