Rich Freeman via plug on 17 Jun 2020 14:59:02 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] sshd as regular user


On Wed, Jun 17, 2020 at 4:57 PM brent saner via plug
<plug@lists.phillylinux.org> wrote:
>
> Non-privileged ports spawned by regular users are publicly-accessible too. ;)

Sure, but an exploit will be contained to the specific user.  That may
or may not be as serious as a root exploit depending on how the host
is used.

When sshd is running as root you have some code running at a very low
priv level and other code running as root.

When sshd is running as non-root you have all the code running as that user.

That certainly opens up some attacks, but it also prevents others.

In any case, it isn't exactly a typical config, and openssh exploits
are relatively rare, so it is really hard to say what the real-world
impact is...

-- 
Rich
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug