Frank Peters posted on Tue, 17 Jun 2014 09:04:34 -0400 as excerpted:

> The problem with all Linux distributions, and not just Gentoo, is that
> they are directed toward a multi-user, networked environment.  As a
> consequence, they exhibit security and other features that generally
> make no sense whatsoever for a single-user desktop machine that
> optionally connects externally only with an ISP through a router/modem.

> In the single-user, desktop environment, the probability of a buffer
> overflow "attack" is virtually nil, especially if one is highly
> selective about "surfing" the Internet and employing Internet software
> (which I am).

> My system is configured in a way that is quite contrary to recommended
> Linux practice (for example I run only and always as the root superuser
> and have no need for file permissions) but yet it makes perfect sense
> for my situation.
> 
> Are single desktop users that much of a minority?  I would hope not.

While I strongly disagree with your position, I equally strongly respect 
you for knowing what you want and sticking to it.  As I said earlier, 
gentoo wouldn't be gentoo if it didn't both allow such a thing and make 
it reasonably easy by exposing and automating the tools necessary to do 
such things, and that sort of individualism is /exactly/ what gentoo is 
about. =:^)

As to the disagreement, I guess I'm a single-human-user desktop system 
user too.  But I recognize the benefits of running various daemons as 
their own (non-human) user, for instance, and in fact, I've gone to some 
lengths to setup two entirely separate user accounts, a generic user 
account and a sysadmin account, so I don't have to "take the name of root 
in vain" when I have my sysadmin hat on.

My normal user is deliberately quite restricted, only a very few 
restricted sudo commands available, etc.  It's the only one that runs X.  
One of the few things that user CAN do, however, is sudo (with password) 
to the admin user.

The admin user in turn has unrestricted passwordless sudo, but does NOT 
operate as root /without/ that sudo.   Running as the admin user, among 
other things I avoid live-editing a potentially damaging command (like 
rming a system file) as root -- I type the command in and initially run 
it as the unprivileged admin user.  Of course then the risky command 
fails with a permissions error, but in so doing it lets me see exactly 
what it WOULD have done (which files it would rm, etc).  If and only if 
it's the file(s) that I intended (and ONLY those files), I can quickly 
uparrow to bring the command back, hit home and add the sudo, to run the 
command for real.  But that admin user doesn't run X, nor can I su or sudo 
any X-based apps as root, from my normal X-using user.  Superuser is 
strictly limited to the commandline, and even then, I normally don't run 
a full shell as superuser, instead only executing specific commands as 
superuser using sudo.

So quite in contrast to you, I don't normally even escalate to superuser 
even when I'm doing admin tasks, except for specific commands.  But sudo 
and sudoedit (which I have aliased to simply s and se, respectively, with 
an smc for sudo mc, as another frequently used alias) are tools I use all 
the time.

Meanwhile, as rich0 already alluded to, several of the recent malware 
incidents have been propagated via otherwise legitimate ad-networks, 
placing vuln-trigger ads on otherwise legitimate and widely respected web 
sites.  If you're running ads on your favorite news site, you're 
potentially vulnerable, as that's specifically the channel of attack 
they're using these days.

Now of course I run noscript and request-policy, both set to whitelist 
mode, blacklisting all off-site scripts and all site-to-site-connections 
except those that I've specifically allowed, and I also run privoxy, so I 
don't tend to see many ads.  And I don't actually have any plugins 
registered either and DEFINITELY no servantware such as flash, another 
typical malware-injection method.

But that doesn't mean I don't appreciate stack-smashing protection and 
the like for my browser, and in fact, every time /any/ program segfaults 
or the like, I find myself quickly evaluating the chance that said 
segfault was due to a buffer overflow, what might have triggered it, the 
data I was working on at the time and where it came from, and the 
potential risk of malware injection.  So I'm certainly appreciating this 
SSP here as I appreciate the lowering of risk profile it brings! =:^)

But obviously your use-case and mine are about as contrasted as they 
could be even if we're both running single-human-user desktop systems; 
you're running as root all the time, while I try not to even run a shell 
as root.  You don't care about SSP and the like, while I definitely 
appreciate the lower risk profile and spend a significant amount of my 
time educating myself on current security issues and actively avoiding 
things that might increase my risk profile.

But as I said, I can and do still respect that.  You have every right to 
run that way if you like, and gentoo even tends to make it easier for you 
to do so. =:^)

-- 
Duncan - List replies preferred.   No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman


Reply via email to