LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-09-2017, 04:46 PM   #1
Crippled
Member
 
Registered: Sep 2015
Distribution: MX Linux 21.3 Xfce
Posts: 595

Rep: Reputation: Disabled
Systemd vulnerabilities.


While the distro I use is MX-16.1 Linux that is systemd free. Those of you that has systemd here are vulnerabilities you should be aware of. https://www.youtube.com/watch?v=rGWCWgomQp4
 
Old 07-09-2017, 08:42 PM   #2
Barkester
Member
 
Registered: Jan 2017
Location: SE Asia
Distribution: Arch
Posts: 67

Rep: Reputation: Disabled
A bigger vulnerability is probly' clicking links to youtube or anything Alphabet connected.

Better to just check this out as it made it all crystal for me :

https://wiki.archlinux.org/index.php/User#User_groups

The key section is "pre-systemD user groups". Notice you now have to either give all 9 privileges whereas pre-SD we could assign them individually. Thats a loss of power and can be exploited.

I'm using Arch and considering Slackware to support the divergence from Systemd. I'll check into MX-16.1 as well now. Thanx for that.

I am interested in any more info you've got if you could type it out or link to a reputable text. Movies are so slow. Text lets me scan to what I need and get on with it. Tubes seem more suited to cat vids.

I'll now check into this MX flavour. Sounds interesting.
 
Old 07-09-2017, 08:54 PM   #3
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,070

Rep: Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897
There were these reports:

http://www.theregister.co.uk/2017/07...user_accounts/
http://www.securityweek.com/linux-sy...alid-usernames


although Lennart Poettering didn't consider that there was anything to fix (tbh that worries me more than the actual problem).


Also in that general area

http://www.theregister.co.uk/2017/06..._by_dns_query/
 
Old 07-15-2017, 02:21 AM   #4
tazza
Member
 
Registered: Jul 2005
Distribution: Slackware64 -current
Posts: 114

Rep: Reputation: 31
I found this article some time back, and although that particular exploit is sorted, he goes into some detail as to why PID 1 should do one thing and one thing only.. not stuff around trying to do everything including the kitchen sink with hundreds of processes hanging off it.

https://www.agwa.name/blog/post/how_...d_in_one_tweet

Run.. run like the wind (from systemd) Why the hell should it be taking over network management?

https://www.infosecurity-magazine.co...nerability-dns
 
Old 07-15-2017, 09:18 AM   #5
Crippled
Member
 
Registered: Sep 2015
Distribution: MX Linux 21.3 Xfce
Posts: 595

Original Poster
Rep: Reputation: Disabled
From the article from Andrew Ayer "The Linux ecosystem has fallen behind other operating systems in writing secure and robust software. While Microsoft was hardening Windows and Apple was developing iOS, open source software became complacent." This makes me laugh. Microsoft was hardening Windows is laughable. Windows has more back doors than a brothel and Windows 10 is spyware/malware. And Apple with their key logger is hardening? LOL
 
Old 07-15-2017, 04:22 PM   #6
tazza
Member
 
Registered: Jul 2005
Distribution: Slackware64 -current
Posts: 114

Rep: Reputation: 31
Heh yeah I did notice that - I might have to steal your phrase "more back doors than a brother" it has a bit more kick to it than my "more holes than swiss cheese". On the whole though, his key points are still valid.
 
1 members found this post helpful.
Old 07-20-2017, 04:54 PM   #7
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
Quote:
Originally Posted by Crippled View Post
Windows has more back doors than a brothel
Name your source. As of today, Windows and OpenBSD are the two mainstream operating systems with the most exploit mitigation techniques enabled by default, with Microsoft having an official tool (EMET) to enable the rest. The Linux kernel team does not do that, and only the laughable security of macOS prevents the Linux kernel from being the most dangerous mainstream operating system kernel.

Granted, all relevant operating systems allow their users to execute malware (e.g. JavaScript malware in today's browsers).
 
1 members found this post helpful.
Old 07-20-2017, 04:57 PM   #8
Crippled
Member
 
Registered: Sep 2015
Distribution: MX Linux 21.3 Xfce
Posts: 595

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by YesItsMe View Post
Name your source. As of today, Windows and OpenBSD are the two mainstream operating systems with the most exploit mitigation techniques enabled by default, with Microsoft having an official tool (EMET) to enable the rest. The Linux kernel team does not do that, and only the laughable security of macOS prevents the Linux kernel from being the most dangerous mainstream operating system kernel.

Granted, all relevant operating systems allow their users to execute malware (e.g. JavaScript malware in today's browsers).
My source is in the first post which you failed to read. What does Microsoft and Apple have to do with systemd?
 
Old 07-20-2017, 04:59 PM   #9
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
How does the first post qualify as a source for a high number of Windows backdoors?
 
Old 07-20-2017, 05:02 PM   #10
Crippled
Member
 
Registered: Sep 2015
Distribution: MX Linux 21.3 Xfce
Posts: 595

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by YesItsMe View Post
How does the first post qualify as a source for a high number of Windows backdoors?
Sorry. I don't feed trolls.
 
Old 07-20-2017, 05:04 PM   #11
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
You said, Windows had a large number of backdoors. The first post doesn't say that. I did not know that asking for a source is "trolling". I thought you were an anti-Windows troll instead.

Sorry for any misunderstanding.

Last edited by YesItsMe; 07-20-2017 at 05:06 PM.
 
Old 07-20-2017, 10:49 PM   #12
Turbocapitalist
LQ Guru
 
Registered: Apr 2005
Distribution: Linux Mint, Devuan, OpenBSD
Posts: 7,306
Blog Entries: 3

Rep: Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720
Quote:
Originally Posted by YesItsMe View Post
You said, Windows had a large number of backdoors. The first post doesn't say that. I did not know that asking for a source is "trolling". I thought you were an anti-Windows troll instead.

Sorry for any misunderstanding.
If you're serious and not just trolling then you seem to have been missing a lot of high profile news from recent years regarding Windoze holes being used as backdoors. People at random find out about the holes, criminal groups find about the holes, government agencies find about the holes, and, eventually, M$ privately acknowledges the holes but refuses to patch until either of the first two groups get too high profile in their exploitation of said holes. Only when a patch is ready does M$ even acknowledge the holes. Sadly the patches often do not work and or break something else.

systemd adds so much complexity and failure that the same approach could conceivably be taken with systemd/Linux systems.

For sources that style of backdoor, news from Wikileaks Vault 7 and active exploits developed for known Windoze holes, like EternalBlue, would be a good place to start.

Last edited by Turbocapitalist; 07-20-2017 at 10:50 PM.
 
Old 07-21-2017, 02:03 AM   #13
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
You did notice that Vault 7 included a good number of Linux backdoors as well, right?
 
Old 07-21-2017, 02:10 AM   #14
Turbocapitalist
LQ Guru
 
Registered: Apr 2005
Distribution: Linux Mint, Devuan, OpenBSD
Posts: 7,306
Blog Entries: 3

Rep: Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720Reputation: 3720
Quote:
Originally Posted by YesItsMe View Post
You did notice that Vault 7 included a good number of Linux backdoors as well, right?
Yes, but what is missing on the Linux side is the collaboration to encourage agencies to exploit the holes while months or years pass by before the vendor fixes them.
 
Old 07-21-2017, 02:18 AM   #15
YesItsMe
Member
 
Registered: Oct 2014
Posts: 915

Rep: Reputation: 313Reputation: 313Reputation: 313Reputation: 313
They, legally, don't have to ask the vendor for permission as US-American companies are required to help their agencies. Including Red Hat and Google, that is.

Food for additional thoughts: The NSA-driven SELinux component was found to introduce severe security holes in January.
http://rhelblog.redhat.com/2017/01/1...vulnerability/

Do you really think that nobody knew that?

Last edited by YesItsMe; 07-21-2017 at 02:20 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: systemd 230 Launches with DNSSEC Enabled by Default in systemd-resolved LXer Syndicated Linux News 0 05-22-2016 11:41 AM
Can't access full journalctl from script via systemd service even though user is in systemd-journal group iwtbf Linux - Newbie 0 02-19-2016 02:44 PM
LXer: Why pro-systemd and anti-systemd people will never get along LXer Syndicated Linux News 0 05-15-2015 11:44 PM
LXer: Debian: 2777-1: systemd: Multiple vulnerabilities LXer Syndicated Linux News 0 10-15-2013 04:40 AM
Boot Delay 30min: systemd-analyze blame systemd-tmpfiles-setup.service BGHolmes Fedora 0 07-27-2011 09:02 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:44 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration