17
submitted 2 days ago by Quail4789@lemmy.ml to c/linux@lemmy.ml

I noticed Debian does this by default and Arch wiki recommends is citing improved security and upstream.

I don't get why that's more secure. Is this assuming torrents might be infected and aims to limit what a virus may access to the dedicated user's home directory (/var/lib/transmission-daemon on Debian)?

you are viewing a single comment's thread
view the rest of the comments
[-] Quail4789@lemmy.ml 3 points 2 days ago

Isn't that a risk for anything downloaded, assuming I run transmission as my user, not root?

[-] rc__buggy@sh.itjust.works 4 points 2 days ago

Is your user in the sudo group? The user transmission should not be

[-] Quail4789@lemmy.ml 2 points 2 days ago

My user is, yes. But there has to be an exploit in sudo for the program to elevate itself using it without the user knowing, no? It's possible for sure but I'm seeing this type of a precaution on a torrent client for the first time.

[-] BaumGeist@lemmy.ml 5 points 2 days ago

The point of security isn't just protecting yourself from the threats you're aware of. Maybe there's a compromise in your distro's password hashing, maybe your password sucks, maybe there's a kernel compromise. Maybe the torrent client isn't a direct route to root, but one step in a convoluted chain of attack. Maybe there are "zero days" that are only called such because the clear web hasn't been made aware yet, but they're floating around on the dark web already. Maybe your passwords get leaked by a flaw in Lemmy's security.

You don't know how much you don't know, so you should be implementing as much good security practices as you can. It's called the "Swiss Cheese" model of security: you layer enough so that the holes in one layer are blocked by a different layer.

Plus, keeping strong security measures in place for something that's almost always internet connected is a good idea regardless of how cautious you think you're being. It's why modern web-browsers are basically their own VM inside your pc anymore, and it's why torrent clients shouldn't have access to anything besides the download/upload folders and whatever minimal set of network perms they need.

[-] nanook@friendica.eskimo.com 1 points 2 days ago

@BaumGeist @Quail4789 If you get software from an untrusted source, and it does not matter if it's a torrent, ftp, https, scp, etc, you run this risk. And usually when you download with a torrent the supplying site will publish a hash which you can compare to make sure that it wasn't corrupted in transit.

[-] nanook@friendica.eskimo.com 1 points 2 days ago* (last edited 2 days ago)

@Quail4789 @rc__buggy@sh.it just.works there is not a known exploit in sudo but there IS a known exploit in the library it uses to elevate privileges, at least in older versions. Also I make full system weekly backups so worst comes to worst I'm never going to lose more than a weeks data.

[-] rc__buggy@sh.itjust.works -1 points 2 days ago* (last edited 2 days ago)

Then run it as your user. It's not best practice but you do you

edit: lol

[-] nanook@friendica.eskimo.com 1 points 2 days ago

@rc__buggy @Quail4789 And that is a very good point but the only thing I ever use transmission for is downloading distros. If my distro is already compromised then it's already all over, transmission aside.

[-] nanook@friendica.eskimo.com 4 points 2 days ago

@Quail4789 @mik Anything that you execute, yes.

[-] bad_news@lemmy.billiam.net 1 points 2 days ago

It's more the situation where the torrent/magnet string itself (or some peer connection) has some clever hack that exploits a bug in Transmission, allowing it to execute arbitrary code AS transmission. I'm skeptical there's a big risk of that, but the security theater kids LOVE sand boxing these days

[-] mik@sh.itjust.works 5 points 2 days ago

It may be mostly "security theater" but it requires almost no extra effort and drastically increases the difficulty of compromise by adding privilege escalation as another requirement to gaining root access.

[-] Quail4789@lemmy.ml 1 points 2 days ago

Has there ever been such an exploit? Given all other torrent clients I've seen just run as your user by default, is there something different in transmission over others that make it more vulnerable?

[-] loutr@sh.itjust.works 4 points 2 days ago

The point is also to minimize potential damages caused by a bug in the software. Just this year there have been multiple data-destroying bugs in publicly released software. If the app runs as a server it's usually trivial to have it run as a dedicated user, with just enough permissions to do its job.

It's just good practice, even though the risks might be low why risk it at all?

[-] bad_news@lemmy.billiam.net 2 points 2 days ago

Not of which I'm aware. Transmission is more intended to run on a server though. You certainly can just run the local GUI, but it can run as a daemon on a server and then you can use a web interface or app, so its working more on a server v user app paradigm (Everything on a modern server like that is gonna run as its own user)

[-] lord_ryvan@ttrpg.network 1 points 2 days ago

Not yet, but if every system was only protected against what already happened instead of also what could happen, we'd get hacked a lot more often!

this post was submitted on 14 Oct 2024
17 points (100.0% liked)

Linux

47733 readers
918 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS