Hi,

I'd like to implement a feature similar to screen's `password' command
that "encrypts" a session with a password. If a session (or the whole
server) is protected with such a password, attaching a session or
sending any command to a session should be prohibited unless the
correct password is presented.

The use case should be clear: Unauthorized access to a user account
should not instantly lead to root privileges on the local machine
because of a left-open root shell nor to privileges on remote hosts
that you are connected to via SSH from inside a tmux session.

There's an obvious fallacy: If the tmux process runs with user
privileges, you can simply attach to it and/or modify the memory to
bypass this protection. So this would become a rather small hurdle
than a real protection, at least for a skilled attacker.

However, if tmux would be installed as setuid root, then simply
attaching to the server process is not possible. So, from a
theoretical POV, by just installing tmux suid root and adding some
simple privilege dropping mechanisms in the right places, the above
attack could be made impossible. The setuid thing could be made a
compile time option with an appropriate warning, so that the
user/admin can decide.

How feasable is such an approach? Is the effort warranted at all?
And if not: How do you go about protecting open root shells and SSH
sessions? Any comments and thoughts appreciated.

Thanks,

Julius

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
tmux-users mailing list
tmux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tmux-users

Reply via email to