You are not logged in.
Pages: 1
Hi,
i'm wondering that there are security risks when i'm running linux binaries downloaded from the internet.
suppose that there's a C program which is designed to destroy everything under my home directory (~/).
of course its not gonna destory my system because of permission problems, but, all other important stuff are gone as well.
so, is there a way to run a binary safely under linux (just like in VMs)?
Last edited by b4283 (2009-07-26 03:15:45)
Offline
i have to apologize for the silly question that i just found out a stupid answer for myself.
all i have to do is use su to switch to another not so important user
Offline
so, is there a way to run a binary safely under linux (just like in VMs)?
Maybe I'm missing something obvious, but if you want to run it safely "just like in VMs", why don't you run it in a VM?
You could also run it as another user with restricted permissions to protect your own home directory. I think you can also use chroots to limit what it can do, but I don't know.
You're probably better of not running anything that you don't trust though. Even if you don't notice anything, it might be doing something nasty or be configured to wait until it does.
*edit*
i have to apologize for the silly question that i just found out a stupid answer for myself.
all i have to do is use su to switch to another not so important user
I really need to learn to refresh the page before replying.
Last edited by Xyne (2009-07-26 03:20:16)
My Arch Linux Stuff • Forum Etiquette • Community Ethos - Arch is not for everyone
Offline
I really need to learn to refresh the page before replying.
lol. thanks for replying anyways, your gave other solutions as well, so it's pretty useful too.
Offline
chroot is the simplest way to do it, really.
Allan-Volunteer on the (topic being discussed) mailn lists. You never get the people who matters attention on the forums.
jasonwryan-Installing Arch is a measure of your literacy. Maintaining Arch is a measure of your diligence. Contributing to Arch is a measure of your competence.
Griemak-Bleeding edge, not bleeding flat. Edge denotes falls will occur from time to time. Bring your own parachute.
Offline
you can always use AppArmor or TOMOYO - thanx that you will know which files binary has an access to.
and, as was written earlier, you can always use chroot- or standard, linux chroot or modified chroot provides by kernel patched by grsecurity.
Offline
chroot is the simplest way to do it, really.
but don't you need to setup a whole root directory to make chroot work ?
Offline
ngoonee wrote:chroot is the simplest way to do it, really.
but don't you need to setup a whole root directory to make chroot work ?
The pro is that is less work and overhead than setting up an entire operating system to do this in a virtual machine. The con is that it still gets access to your devices and disks if the process gets root.
Last edited by Wintervenom (2009-07-28 01:58:18)
Offline
alternatively you can try to analyse the binary. Run strings against it, etc. before running the binary
IIRC there is a page on phrack on analysing binary files.
Offline
alternatively you can try to analyse the binary. Run strings against it, etc. before running the binary
I know Linux users are meant to be geeks, but really....
Offline
Pages: 1