On 19/04/16 18:48, Joe Schillinger wrote:
Hi misc,

Should /home be mounted as noexec by default for security? I noticed
~/bin is in the default $PATH (via /etc/skel/.profile), but isn't this
somewhat of a security risk? Theoretically, if a threat has unprivileged
access, wouldn't it be able to execute unauthorized programs?

Someone mentioned this to me after they saw I was using ~/bin to house
my scripts, and it made me think. Anyone have any info on whether this
is/is not an issue? Are protections already in place in OpenBSD to
mitigate this? Am I getting trolled?

Thanks,
Joe


If users are supposed to run their programs in their home dir under their privileges I see no security risk there. They are allowed to run shells, perl, php, python so they can mess up an insecure system without needing a native binary in their home.

On the other hand, in filesystems like /tmp /var /var/www where you might not need to host executables you can mount noexec (depends on the case)

G

Reply via email to