/All/
|
index
catalog
recent
update
post
|
/math/
/tech/
/anime/
/misc/
/free/
/meta/
|
Guide
dark
mod
Log
P93562
profile of a un*x domain boomer
Tue 2024-05-14 11:09:28
link
reply
34e2eb45f628ac88ee44ccd0b616cca6b457bdd4f0944aa6627c2935ee80fca3.jpg
3.44 MiB 4032x3024
1847b27d8da13cb75abf78a8b33ae1f9e5cf5cc146fa92d884e5733033af943d.jpg
1.84 MiB 2592x1936
78a5d1b369367a7087e981d3faab30860cd2cd2f29d4bbfbf6ed4395fd13ec3f.jpg
1.06 MiB 3088x2316
72cffdae2b48da430c4af3e3b86f7f448d3a956c04c5b4b1cd6dbd8bb625c408.jpg
43.6 KiB 461x674
this is peak un*x domain boomer
>is a soyjak
>uses a bunch of terminal bullshit while gaining no productivity (otherwise you would do something interesting in your academic life other than get one patch into DNS or BSD during a 30 year period)
>long autistic posts about stuff that doesnt matter like how the name of a thing was chosen
>some stupid *****ing "geek" tshirt
>I am a Unix system developer from Cambridge. I work on BIND9 at the Internet Systems Consortium (isc.org).
>
>For many years I worked at the University of Cambridge at first helping to run the central email services, and in later years running the University’s DNS.
<i spent my life working on a DNS software and administrating it at a uni
https://dotat.at/name.html
standard autism about a name dont care didnt ask
https://dotat.at/email.html
OMG how did nobody buy dotat.at when .co.at relaxed their restriction hawhwwwywyyguuuhhhghghhhhh aaaahaaaaaugggghhhhh i cant believe it
https://dotat.at/pgp.html
>OMG LOOK I CAN SHOW OFF MY EMAILS ZOMGZOR
>actually uses that feature where you can attach multiple UIDs to a PGP key instead of just leaving the email blank like youre supposed to
https://dotat.at/@/2022-07-01-dns-compress.html
haaaauuugggghhhhwaaaaggghhwaaaaaaaaaaggghhwweeeeee
but at least he understands what sudo actually does, the retards here should go argue with him:
https://dotat.at/@/2024-05-02-sudo.html
or just all the other nerds in open source, who actually believe something else and would break down if they had to come to terms with actuality
Referenced by:
P93945
P93570
Tue 2024-05-14 14:39:23
link
reply
>but at least he understands what sudo actually does
I always login as ROOT
P93595
Tue 2024-05-14 20:25:21
link
reply
Why do you hate open source hackers so much?
Referenced by:
P93681
P93782
P93615
Tue 2024-05-14 22:41:43
link
reply
This guy gets it. But I already made a thread called "sudon't". Maybe he copied me!
P93634
GNU/sage
Wed 2024-05-15 02:41:29
link
reply
>>>/wtech/
P93639
Wed 2024-05-15 03:11:34
link
reply
>
https://dotat.at/name.html
>standard autism about a name dont care didnt ask
using real name as a dev even
>the retards here should go argue with him:
https://dotat.at/@/2024-05-02-sudo.html
I do sudo su is dat ok?
P93681
Wed 2024-05-15 10:41:17
link
reply
b6754a7abf57628b4bb7e352618bf9770b29d250c6cbefac72ce77178d30cd75.jpg
51.3 KiB 600x850
P93595
because theyre *****jobs incapable of making the most simple things work.
the fact that people dont understand what sudo does is not a problem. the problem is that because of that there is no actual way to do isolation in any system ever built - nobody understands that its a thing thats desireable and for the 3 seconds they think about it they just conclude that sudo does it
firefox is slow buggy dogshit. even just the GUI is complete trash. why does it *****ing black the screen for seconds when you fullscreen a video? because security theater, some autist had a LARP one day and nobody in the tranny community has enough brains to explain why hes wrong, plus that it be toxic to say someone was wrong.
*sh/un*x tools is slow buggy liquid AIDS with infinitely deep rabbit holes of RCE vulnerabilities.
every ecosystem like java, C, shell, Go, node, etc is pure ***** shit and the only thing they actually do in the updates youre forced to consume is add the latest feature that some soydev wants to use to dildo himself, like linters, or some "FP" feature taped on in the most stupid *****ing way. just using firefox requires pulling millions of lines of code from some corporate tranny and since its riddled with bad programming techniques you have to do so twice a week or you will be exploited by websites.
these monkeys make sure there is no way to use "off the shelf" software to interface with the [[[web]]]. they still cannot solve *****ing string injection vulns or confused deputies, and are only now becoming aware of the fact that having 300 dependencies gives 300 organizations an opporunity to exploit you. the fact that they hard focus on "memory safety" and suddenly ignore all other security issues is a trademark of autism and why autistic people should be banned from engineering. the fact that they didnt just python or java which also solves memory safety proves their incompetence irrevocably. rust is a shit language that is obtained when 6000 trannies pile into a think tank, its complete garbage just like all previous mainstream PLs.
DNS is garbage and youre garbage if you take it seriously, it shouldnt even exist. anyone who is "into" DNS is the dumbest *****ing loser geek. and theyre harmful too because they get all like HEWWUEEUEUEHGHGUUYAUUGGH what if someone DDOSes the root name server OMG that should be 30 years of prison. and other such statist misconceptions. by extension (but not only) X.509 is also garbage. openssl is the dumbest *****ing project ive ever seen. even if it was implementing a sane protocol it would still be shit software.
[bold:
THIS IS WHY HAPAS ARE SUPERIOR TO WHITES
]
[bold:
DAY OF THE SEAL SOON
]
Referenced by:
P93731
P93780
P94190
P93731
Wed 2024-05-15 23:48:13
link
reply
a5c4bdc958db3e1755f471f0f90b8c07c2bd1e45d1504f5c870e3f42c5f4e53a.webp
43.2 KiB 500x405
P93681
>every ecosystem like java, C, shell, Go, node, etc is pure ***** shit
Then make your own.
>*sh/un*x tools is slow buggy liquid AIDS
And yet the day of the seal has not materialized.
>the fact that they hard focus on "memory safety"
This was your talking point a few years ago.
>DNS is garbage and youre garbage if you take it seriously
This has been fixed.
>X.509 is also garbage
The centralization is probably not a good idea, especially with the fragility it introduces. Still better than what you have produced
[spoiler:
literally nothing
]
>openssl is the dumbest *****ing project ive ever seen
Then don't use it. Oh, wait. The alternatives are made by the people that you have been criticizing as "un*x boomers"
>hapas
I notice that you still have not released any alternatives, and appear to have made no progress toward one, either. All you do is post schizo rants on imageboards.
Referenced by:
P93750
P93755
P94190
P93750
Thu 2024-05-16 06:30:43
link
reply
P93731
> Then make your own.
I did. But guess what?
> And yet the day of the seal has not materialized.
Because software is not essential for living. Nobody needs IT shit in general.
Referenced by:
P93755
P93755
Thu 2024-05-16 11:40:39
link
reply
77e31359cf97811d7f75c23962518f52492b5b9d2535e127979c256bff445c61.png
381 KiB 500x409
P93731
wow you eat up all the dumbass plastic intellectually fraudulent shit that doesnt work because youre from america and goo goo ga ga everything we make here is just good so there hmph! you could get the special developer award at spotify
P93750
u wot
P94190
Sat 2024-05-18 23:12:52
link
reply
P93731
P93681
As long as 99% of normies are using Spotify, Google Maps, and some other proprietary shit for *chat*, there is no need for "day of the seal".
P94224
Sun 2024-05-19 14:02:13
link
reply
He basically makes zero suggestions as to what users on laptops and desktops would do right now to replace sudo, which is where sudo is constantly used. doas was made with those users in mind and he rejects it over... the formatting? What?
On OpenBSD, doas is pretty much more secure than sudo since it avoids extra features. On Linux, you have to use a pretty new kernel to avoid TIOLINUX/TIOCSTI "bugs", and Opendoas will use timestamps like sudo for the persist feature because the kernel has no support for it.
Totally our guy Poettering is making a sudo replacement that extends systemd-run to be a sudo-like tool without setting setuid on some binary. Although this requires you to have a very large init system and service manager (systemd) to run it, thus increasing the attack surface again if you were using something else.
Constantly abusing su or logging in as root would end up in some sleepy user removing their entire /etc/ or something, or leaving themselves logged in as root all day long because they forgot it was there.
Basically don't take security advice from DNS/Email people (notice that neither of those are encrypted or even authenticated properly by default), or hapas, they have no idea what they're talking about.
Referenced by:
P94235
P94326
P94231
Sun 2024-05-19 17:35:09
link
reply
4de1e28653310aee45984af0fb1938afcd876cc84be6a41d5cb91d34c54ac864.jpg
48.5 KiB 924x720
>34e2eb45f628ac88ee44ccd0b616cca6b457bdd4f0944aa6627c2935ee80fca3.jpg
I like that (clone of) a bbc micro keyboard
SAUCEPAN |micro
P94235
Sun 2024-05-19 18:35:40
link
reply
97d066c96cc507ece18888fbdd363eeb551b131022672fb8ad0a959198842b29.jpg
91.6 KiB 1366x768
P94224
>unlike the dumb hapas, i type sudo for no reason before every command that needs privileges
riiiiiight.
Referenced by:
P94238
P94325
P94238
Sun 2024-05-19 18:45:44
link
reply
P94235
How do I add my 4 inch erect cock to the sudo group?
Also how do I find a tailscale tunnel that will fit?
P94325
Mon 2024-05-20 11:51:52
link
reply
d94323c6ccf3a630f5da56cdf013fd53ad070f8ae2b6751ab7ecccc276bfc819.jpg
85.6 KiB 618x618
P94235
>For no reason
<for every command that needs privileges
Do you read these before posting?
P94326
Mon 2024-05-20 12:00:41
link
reply
fdac7177877c7d5c215566bd669e1ea5ee91978fbb95ec2bf8246be02ace291a.jpg
53.0 KiB 424x600
P94224
>NOOO U HAVE TO SUPPLY AN ALTERNATV TO SUDO!!
sudo has no legitimate use. run everything as root. dont ever use users at all since its an obsolete feature from multiuser university networks circa 1970
>autistic details
sorry to pull you out of your rabbit hole, but the idea of escalating to root from a non-root compromised account is incompatible with un*x, not that it really makes any sense in *any* system, even hypothetical ones. for example you can just change PATH to point to your own version of sudo, make sudo an alias, ptrace sudo to capture the password as its typed, etc. even if that werent the case on any mainstream distro, i still wouldnt care because i dont even need root when hacking a desktop user, everything i need is in $HOME.
>our guy
who? im not in your little club. of course [[[pottering]]] is making an his own brand of alternative to an idea that makes no sense
>logging in as root would end up in some sleepy user removing their entire /etc/
ah yes, just like windows users accidentally remove /system32
ironically the only valid point you have here is what i say every day: un*x is too complicated an error prone especially bash where any typo is interpreted as a completely different command typically resulting in removing some random file from your system
Referenced by:
P94330
P94469
P94677
P94328
Mon 2024-05-20 12:04:46
link
reply
1cb2b8d2b501d3cac316d38aa30ee488133ff07f5dd6dba1948156a1b1a4daad.jpg
110 KiB 600x1364
>Basically don't take security advice from DNS/Email people
Yes.
P94330
Mon 2024-05-20 12:17:21
link
reply
P94326
>dont ever use users at all since its an obsolete feature from multiuser university networks circa 1970
So what if I want multiple people to be able to use one computer?
Referenced by:
P94396
P94337
Mon 2024-05-20 16:37:04
link
reply
ce2e061bd6a714abe82d35f37eff0047aee67d78469e129f32488c57396d6246.jpg
95.0 KiB 720x732 (Spoiler)
fbd259fb0287122666ab1ae0ec9a0d396a8ebd768392fba6fff7c0f49f965aec.jpg
788 KiB 3886x2642 (Spoiler)
take meds schizos. Its not about being a boomer or not. Its practicality. terminals are way more practical than modern bloated linux desktops. Why would you need gui + bloated xserver desktop for just editing plain text files?
Referenced by:
P94396
P94374
Tue 2024-05-21 01:46:45
link
reply
>run everything as root. dont ever use users at all since its an obsolete feature from multiuser university networks circa 1970
The Microsoft operating systems, Amiga (and Commador), and *****/M are only systems that I know of that do this. There's a difference between major systems that people use to get work done and a
[bold:
personal
]
computer. The "run everything as Administrator" is what gave us the viruses/worms of the MS-DOS - Windows Xp era (which I might add, was quite fun as long as you were not the one infected).
Even Android has a root account (that you can't access) and normal user account. I'm guessing Apple does the same thing. I don't own any Apple so I can't be sure.
Referenced by:
P94396
P94397
P94396
Tue 2024-05-21 10:44:16
link
reply
ac729bae1b36158727d0d303805229616509e87360c2936c101857ea6fcb5eeb.jpg
45.5 KiB 397x600
P94330
nobody is talking about multi user systems and even if they were sudo on those still makes no *****ing sense and is like putting a finger in your ass every time you drink a glass of water to prevent brain cancer
P94337
terminals arent more efficient for anything, but im sure youve convinced yourself otherwise after spending 3 years of your life figuring out how to do some basic stuff in it that a 5 year old on GUI learns, like with readline and vim/emacs. im definitely not advocating making dumb ***** plain text formats and then proceeding to edit them with tools, which is, OH, something that the terminal idiom does too every time you make a shell script that parses the output of any command what so ever
P94374
you took the words right out of my mouth, we should go back to amiga because all software isolation techniques developed after that are invalid. you dont know what youre talking about, and are even more clueless than the sudo doas autist.
Referenced by:
P94399
P94460
P94516
P94397
Tue 2024-05-21 10:44:59
link
reply
P94374
Mac does have a root account that you can access (using sudo or su). Not sure about IOS.
P94398
Tue 2024-05-21 10:51:15
link
reply
a5ba2ffe4146bda8495123a51d0aec8e86e76c624ef0cd6c43c82ea50b15af0c.jpg
40.6 KiB 522x600
>There's a difference between major systems that people use to get work done and a
[bold:
personal
]
computer.
and that difference is completely fabricated imaginary concept that boomer faggots love to suck each others' cocks about while pretending like theyre using the big boy stuff as you just exemplified. in reality, microsoft has never had real user isolation since there is almost always a way to bypass it once youre anywhere in a box in a network
yeahhhhh bro, whenever i waste my time writing sudo and retyping it because i typed it before the prompt showed up then had to wait a second for [[[cracklib]]] to waste time hashing the password or forcing a delay or whatever the *****, its because im getting real work done. yep that [[[UAC]]] prompt that you click through 50 times per day definitely is getting big boy work done. ironically those things are broken and invalid like sudo.
Referenced by:
P94817
P94399
Tue 2024-05-21 10:54:33
link
reply
b0379061fa25689cfd7c70459f34e353c398c70006b3182b0a6b780c48346447.jpg
102 KiB 749x801
P94396
>All software isolation techniques developed after Amiga are invalid
P94460
Tue 2024-05-21 23:31:22
link
reply
P94396
>nobody is talking about multi user systems
Why should a different OS be needed for multiple users?
Whatever overspecialized thing your vision entails would likely be worse than unix.
Referenced by:
P94501
P94465
Wed 2024-05-22 01:17:29
link
reply
a91cecab3e7bc646a77e588f82cfc96ec05c4512b5632dfe6a66f6061b693e61.png
24.6 KiB 968x579
>i waste my time writing sudo
I warned you about sudo-*****. There's even a whole thread on it. If you won't listen then that's on you.
>>>>>>>>>>>>>>>
int main() {
int defined_var;
printf( "Defined_var: %d\n", defined_var );
defined_var = 12;
int ini_var = 25;
printf( "Value of defined_var after initialization: %d\n",
defined_var );
printf( "Value of ini_var: %d", ini_var );
return 0;
}
$ n***** loop node kushal
$ cc DECLARATION.C
$ link DECLARATION.OBJ
$ run DECLARATION
Defined_var: 2147376652
Value of defined_var after initialization: 12
Value of ini_var: 25
$
>>>>>>>>>>>>>>>>>>>
Referenced by:
P94624
P94469
Wed 2024-05-22 01:50:43
link
reply
P94326
>sudo has no legitimate use. run everything as root. dont ever use users at all
>for example you can just change PATH to point to your own version of sudo, make sudo an alias
Basically that can be said about any executable on a Unix-like ever, but it requires a malicious program or a remote shell. At that point plenty of things can happen. Without containers/VMs/some sort of access control a malicious program can do whatever it wants to the user's files, processes, environment variables... But then again you probably ran unknown code unsandboxed outside of a VM or container for this to happen. Stop doing that maybe?
>grabbing the password
This doesn't address users using hardware security keys in addition to a password.
Yes there are OSes that handle this better like the ones based on Genode. You aren't using them because hardly any real hardware is supported.
>running everything as root
A lot of programs aren't even going to function correctly as root, and you will just open up a larger attack surface. The Javascript VM and whatever other VM you inevitably end up running is now running as root. Now any breach of the browser sandbox is immediately escalated to root. I don't know why skiddies are incapable of understanding threat models.
>who? im not in your little club.
It's sarcasm, Poettering somehow believes he has the solution to every droll userspace issue that nobody else does.
P94471
setruid
Wed 2024-05-22 02:03:28
link
reply
>point to your own version of sudo
> ls -l /usr/bin/sudo
-rws--x--x 1 root root 285800 Dec 30 14:22 /usr/bin/sudo*
A basic user can't setruid any file, copy or not. He *can* set-user-id: his own. Am I missing something here?
Referenced by:
P94473
P94501
P94473
setrutard
Wed 2024-05-22 03:18:07
link
reply
P94471
see
P94287
for help
P94501
Wed 2024-05-22 10:50:46
link
reply
433fd07d9fe57f246278ba71b9d2275d404d86061c8b0a8bdae13d4321cf2b79.jpg
36.7 KiB 600x338
P94460
>you wont support the one boomer and his wife who still use accounts on a computer so your OS aint gonna make it
riiiiight..
P94471
in the first quote you pretend or are too senile to understand what the implicit context here is (that sudo is being used to prevent malware from getting root. this is the prime reason people use it)
then in the second quote you seem to suddenly remember that sudo
[bold:
is
]
being used to get root
third quote is just more dumb boomer myths. unsurprising that you have some cringey incoherent response with lots of backpedaling and conflicting assumptions as you little world crumbles.
maybe read the posts above again, you might find something this time.
Referenced by:
P94504
P94505
P94504
Wed 2024-05-22 11:02:48
link
reply
P94501
It doesn't matter that the use case is rare. The fact that you rely on the property of there being a single user means your approach is ill conceived.
P94505
Wed 2024-05-22 11:48:14
link
reply
P94501
>in the first quote you pretend or are too senile to understand what the implicit context here is (that sudo is being used to prevent malware from getting root. this is the prime reason people use it)
You have a fundamental misunderstanding as to what sudo does. It is not an "anti-malware" tool, it executes a command as another user, provides logging of accesses, and has some policy based security. If you have malware, this is probably not going to help you unless it's particularly badly written malware or just spyware. Yes Unix-likes have flaws, but your solution isn't to use a hypervisor, containers, access control (SELinux and so on), and so on to mitigate the issues, you are insisting on... running everything as root. Hopefully nobody lets you touch computers that are actually worth something.
>then in the second quote you seem to suddenly remember that sudo is being used to get root
I was always aware since you insisted on it. After all you log in as root, and apparently use a browser in the root account.
>third quote is just more dumb boomer myths. unsurprising that you have some cringey incoherent response with lots of backpedaling and conflicting assumptions as you little world crumbles.
There is no backpedaling, everything I say is consistent.
Referenced by:
P94510
P94510
Wed 2024-05-22 12:58:16
link
reply
c67fc2a3987a146cee4d894e13a6fbded1f058e135afc7a789ea4e86b980b6fc.jpg
38.8 KiB 371x600
P94505
>malware this and that
sudo is used to prevent malware from getting root. this is what incompetent penguin faggots
[spoiler:
like you
]
believe it does even though it doesnt
[spoiler:
and the fact that malware doesnt need root for anything other than possibly installing a rootkit (even often it still can without root, for multiple reasons) also flies above faggots heads
]
>logging of access
why the ***** would i need to log access when i edit some root owned file.
[bold:
especially when all logging in most un*x systems is spoofable / falliable. top doesnt even provide a real view of the process list, attackers can spoof that too in multiple ways even if they only have an isolated account that has axx to nothing
]
>some policy based security
intentionally vague because if it was stated concretely it would be mocked.
>run everything as root
[asuka yes chad.jpg]
>run browser as root
[asuka yes chad.jpg]
the fact that you do otherwise means you just wasted millions of hours setting up a false sense of security. you do not get even slightly more security when you run the browser as my_leet_gayass_username instead of root.
>There is no backpedaling, everything I say is consistent.
riiiiight...
Referenced by:
P94567
P94511
Wed 2024-05-22 13:01:19
link
reply
meant spoiler, not bold. rip, the spoiler parts are there so you dont autistically dig into them like a naive tree search algo
P94516
Wed 2024-05-22 13:53:03
link
reply
P94396
>using terminals to grow cake in garden without baking
>using orbs to automate things via terminal instead of hiring actual people and pay them full wage to operate GUI-based software
>using terminal to manage *****
>can be run on any hardware (even underclocked 480MHz *****us
how is that 'not productive', sir?
P94517
Wed 2024-05-22 13:54:57
link
reply
I mean 'not efficient'
P94567
Wed 2024-05-22 17:50:04
link
reply
P94510
>sudo is used to prevent malware from getting root.
No, it's not. Otherwise you'd be posting this in their bug tracker instead of on some obscure imageboard. sudo is more for preventing casual access of root by unsophisicated attackers (like some not very computer savvy coworker playing a dumb prank), not being logged in as root 24/7, or preventing your cat typing out rm -rf / on your keyboard.
>why the ***** would i need to log access when i edit some root owned file.
To know who accessed what and when? To know whats going on? Why have logs at all, just redirect your logs to /dev/null if you feel this way.
>especially when all logging in most un*x systems is spoofable / falliable
Out of scope of the program's purpose and usecase. You want clearly want integrity of your
[bold:
log files in general
]
, and this is not the point of su, sudo, doas, systemd-run, etc. Go work on that instead.
If you really don't like entering a password, just do passwordless doas/sudo or whatever else is out there. You can also use a cheap FIDO security key if you want a non-phishable credential.
>you do not get even slightly more security when you run the browser as my_leet_gayass_username instead of root.
It's still worse to run it as root. If the sandbox is breached as your user, then the Javascript being executed still doesn't have root. Your credentials would need to be phished. If theres another unkeyloggable factor, then you can't get the credentials by keylogging them. If the user isn't in wheel, then there is no escalation possible if everything else is secure.
Referenced by:
P94594
P94677
P94594
Wed 2024-05-22 19:03:18
link
reply
7200d1b7092d863e2e47e386c92fe8557e791fb92bb0859e22be72067ec63ca8.jpg
268 KiB 1920x1080
P94567
>sudo is more for preventing casual access of root by unsophisicated attackers
>why the ***** would i need to log access when i edit some root owned file.
What you're both missing is that computers used to be big and expensive and
[bold:
multiuser
]
. sudo stands for Substitute User DO. It is for running a single command as another user. Usually root but it works for any user. Note that unlike su you type _your_ password into sudo. It is most often used as a way of giving people limited root powers without giving them the root password.
Think of it like an imageboard. Admin has the root password. There are mods who can do things like `sudo rm denpas-latest-autisms.txt` but admin will block them from doing `sudo rm -rf /`. In /etc/sudoers you write a policy for which users can run which commands as which other users. Again, it doesn't make that much sense anymore if you are the only human user on the system but that's the history.
You can still use it as a primitive form of sandboxing. You can create a new user account just to run one program and using `sudo -u` to run it. That way the program won't have access to any of your personal files.
>some not very computer savvy coworker playing a dumb prank
If you do work in a place where they don't give you root but let you run some limited commands as sudo then this will help
https://gtfobins.github.io/
Referenced by:
P94677
P94678
P94624
Wed 2024-05-22 23:02:57
link
reply
P94465
What is that code supposed to prove? Uninitialized variables have always worked like that in C.
Referenced by:
P94677
P94677
Thu 2024-05-23 11:16:14
link
reply
6aa1bd010961dfecb4e456bc8d42c2c4a04f17e92a38738a701527d478ace8aa.jpg
61.4 KiB 385x600
P94567
>sudo is more meant of a placebo or a pacifier because i need cock in my mouth at all times
yes, i realize you have an entire lore on how a un*x system is supposed to work (which is garbage and insecure no matter how many is you dot and ts you cross), now shut the ***** up. "phished", its not phishing when there is nothing the user can do to detect or stop it, but i dont expect you to have the slightest clue of how post-exploitation user space trickery works. it would be pointless to go into because you can just fall back on "well sudo is just pretend security, it doesnt need to be perfect, its just to keep my dumb wife from pressing a button". you choose to run a *****ing WEB BROWSER on your TCB and claim im the dumb one, no, boomer, you dont understand anything, or how much people pay to get around your oblivious insecure idiom. i run everything as root, this doesnt include a web browser although on the isolated machines that run it it does run as root because there is no point in having users. remember this every time you type out your password for the 50th time today and it pointlessly delays before youre allowed to type the password because it has to load all the pam modules or whatever the ***** bullshit then you have to retype the password and it delays cus muh brute force deterrence. remember all that bullshit solves absolutely no purpose other than a placebo as you basically acknowledged in your very post here.
P94594
>What you're both missing is that computers used to be big and expensive and
[bold:
multiuser
]
.
i told you at the start that "sudo is obsolete garbage that never made sense from multiuser systems 500 years ago":
P94326
and the boomer HAS been mentioning multiuser systems because he loves to jack off to his lore that never made any sense
>You can still use it as a primitive form of sandboxing. You can create a new user account just to run one program and using `sudo -u` to run it. That way the program won't have access to any of your personal files.
except they will since just like the link you posted there are thousands of ways for zero privs un*x programs to ***** with your other users. boomers dildo themselves into thinking this isnt an issue by enumerating 5 of them and saying "see, its a misconfiguration, user error!"
P94624
dont question the boomer he huffed and puffed real hard to produce that wisdom
Referenced by:
P94685
P94678
Thu 2024-05-23 11:28:47
link
reply
P94594
I already know what sudo is for. The derelict Asuka poster probably isn't using it that way, and I've catered the argument accordingly. Sadly doas or sudo setup without a password is probably what he wants, or using su in one terminal, but he is determined to run browsers and graphical programs as root, which they are almost never tested to run as.
>You can still use it as a primitive form of sandboxing. You can create a new user account just to run one program and using `sudo -u` to run it. That way the program won't have access to any of your personal files.
This is a waste of time nowadays. Use a jail/container program like nsjail or bubblewrap instead and you can get greater isolation for a given executable without fiddling making a new account.
Referenced by:
P94786
P94822
P94685
Thu 2024-05-23 12:34:11
link
reply
P94677
>"phished", its not phishing when there is nothing the user can do to detect or stop it, but i dont expect you to have the slightest clue of how post-exploitation user space trickery works.
You made a fake sudo executable and redirected the user to it using the PATH environment variable. That is "post-exploitation user space trickery" AKA basically phishing by your definition. You can detect it as well assuming the naive case of only replacing sudo in the PATH and not the shell itself or realpath: realpath "$(whence sudo)", or realpath "$(which sudo)". Before you waste time by saying you can do more skiddie bullshit to replace the rest: this is an example to show you that the user was deceived when they could also not be deceived.
>i run everything as root, this doesnt include a web browser although on the isolated machines that run it it does run as root because there is no point in having users.
Oh, so you don't run everything as root. Thanks for accusing me of backpedaling and then actually backpedaling.
> remember this every time you type out your password for the 50th time today and it pointlessly delays before youre allowed to type the password because it has to load all the pam modules or whatever the ***** bullshit then you have to retype the password and it delays cus muh brute force deterrence.
Time to get a computer that isn't from 2003? It doesn't take any noticeable amount of time.
There are simpler alternatives to sudo if your usecase is simpler, that take less time to execute. Here is an absurd example, with benchmarks that make you look very silly:
https://codeberg.org/sw1tchbl4d3/rdo
>remember all that bullshit solves absolutely no purpose other than a placebo as you basically acknowledged in your very post here.
Having a seperate user account from users, password hashing, etc all makes perfect sense when combined with other mitigations. I've already explained how to defeat a "sudo replacement": use a hardware credential and use containers/jails and VMs instead of just users at the very least. Changing the PATH isn't going to propagate outside of that VM or container assuming theres no vulnerability in the VM or container. If you have to run untrusted code, run it inside a container or VM, preferrably on some machine not connected to other machines and the internet.
As for the most basic case, it works, doesn't it? Bob the janitor can't get in and can't guess the password no matter how hard he tries. That's called a threat model, ever heard of it?
The problem is you can't define a threat model at all and are deep into paranoia to the point that you've wrapped around to the other end, which ends up with you running most things as root, which is hilarious. Yes there are holes in classic Unix-like security, we know, it's been augmented since then. Meanwhile people actually work on closing up these beginner skiddie keylogger loopholes and they are pretty much already closed to you on anything that isn't some home computer/laptop/edge device. That sort of stuff is trickling down to edge devices with the whole container/jail/VM as security boundary stuff, Wayland (closes the X clients doing pretty much anything to other X clients loophole), and obviously the rollout isn't perfect because the people who manage those projects do it in a bazaar manner and have limited, sometimes unpaid time. Even package managers are slowly moving away from the traditional filesystem hierarchy at this point, to more of a read-only store model. Gradually they could probably have more of an official permissions system like Android's if they ever came to a consensus (already sort of exists in Flatpak/container tools, although could be improved a lot).
Referenced by:
P94786
P94714
Thu 2024-05-23 21:25:15
link
reply
>grok
Why do they like to say this word?
P94786
Fri 2024-05-24 11:23:34
link
reply
210f1beac88905a58e43fed42a179fc45abd9304f9371ece4fee9acc6895ba3f.jpg
51.1 KiB 394x600
P94678
P94685
[bold:
SHUT THE ***** UP BOOMER SHUT THE ***** UP BOOMER SHUT THE ***** UP BOOMER
]
>>>>>93305
now, if anyone else who isnt a complete invalid wants to discuss sudo again, which isnt the topic of this thread:
1. ubuntu/fedora/debian/etc *****s think that sudo is a security mechanism that prevents a compromise from spreading to root.
2. these *****s also think there is a point in preventing compromise from spreading to root.. on their DESKTOP machine, where everything important is in $HOME
3. sudo has a terrible UI, which if you had any doubt because youre too autistic to understand social norms, reinforces #1: nobody would use that dog shit unless it served a very important security purpose
4. sudo used in this way can and always has been always will be defeatable with trivial tricks like changing bashrc, ptrace, changing what the terminal displays, etc. it doesnt matter if you solve two or three of these, since there are literally thousands, and the list expands and shrinks all the time as software changes. this is an immutable, fundamental propery of a un*x system: youre running a bunch of things as the same user, they can ***** with each other in all kinds of ways that you are not aware of
youre a *****ing moron if you have sudo installed let alone any pam or cracklib bullshit youre just another dumbass consumer like those of systemd. ironically all the anti systemd faggots are just parroting and do not understand what actual bloat and retardation is.
Referenced by:
P94841
P94788
Fri 2024-05-24 11:24:16
link
reply
[bold:
SHUT THE ***** UP BOOMER SHUT THE ***** UP BOOMER SHUT THE ***** UP BOOMER
]
>>>>>
P93305
P94841
Fri 2024-05-24 21:49:05
link
reply
c22bc38df78f53c11a046f4279ccb7e25e7234ab50c847aab02f4a404aaecec9.jpg
21.8 KiB 618x467
P94786
Here we see the hapa, realizing that his arguments are utterly insane, resorting to calling those who see through his insanity retarded boomers.
Referenced by:
P94857
P94874
P95207
P94857
Sat 2024-05-25 03:20:13
link
reply
P94841
>can't read cursive
What's the implication? is he a *****? yts nowadays are unable to read cursive too
Referenced by:
P94881
P94874
Sat 2024-05-25 10:13:04
link
reply
64b1e09d4726f2540710d007db4bf8262360bfd158036a30379dac3790bb5321.jpg
94.8 KiB 600x448
P94841
cant be as insane as typing sudo 50 times per day then convincing urself its for some reason after you realise it doesnt actually stop attackers from doing anything.
>whats the implication
its a typical wh*teoid who amounts to nothing but thinks hes high class because he can dot his eyes and cross his ts. ironically in many places in europe they dont care about cursive for centuries. and calling hapas *****s makes no sense since hapas on average are higher class than wh*tes. for example linkin park, keanu reeves.
P94881
Sat 2024-05-25 12:26:32
link
reply
P94857
>whites nowadays are unable to read cursive too
The alleged "hapa" can't either, apparently.
I know more intelligent negros than him.
P95207
Tue 2024-05-28 01:41:07
link
reply
P94841
ChatGPT can. It is also OK with full stops.
P95231
Tue 2024-05-28 04:03:09
link
reply
>
https://dotat.at/pgp.html
>OMG LOOK I CAN SHOW OFF MY EMAILS ZOMGZOR
>actually uses that feature where you can attach multiple UIDs to a PGP key instead of just leaving the email blank like youre supposed to
Wow I didn't even know u could do that lol
Referenced by:
P95398
P95398
Wed 2024-05-29 11:08:35
link
reply
P95231
because its a half documented bullshit like with all GNU tools. it also caused a vulnerability (but im sure some NEET loser who spent 15 years of his life mastering every un*x command knows better than to fall for this):
https://longpoke.github.io/f37c5de221cb361db07f046b31047f329ddb2ca2fe3ab5b674c858a6686c5151.html
One thing that wasn't mentioned so far is that a key can have multiple key-UID bindings. It's not exactly clear what the purpose of this is, other than perhaps to compensate for the fact that people have multiple names in real life. In any case, it just adds to the confusion. It's so confusing, that the GPG developers even messed up implementing it. There's yet another bug in GPG 2: If a key-UID binding is considered valid by GPG, later another UID can be bound to that key, and it will also appear to look valid. This enables another method of forging messages.
If you have a valid key for "Richie", it will look like this when you verify his messages:
gpg: Signature made using RSA key ID EEEEEEEE
gpg: Good signature from "Richie"
Say he adds a new UID "Richard Stallman" to his key and re-uploads his key to a key server. You then run gpg --refresh-keys. This makes GPG download the updates to his key. The next time you verify a message from him, it will look like this:
gpg: Signature made using RSA key ID EEEEEEEE
gpg: Good signature from "Richie"
gpg: aka "Richard Stallman"
The output doesn't make it obvious that only "Richie" is valid for this key and not "Richard Stallman". This is straightforward to exploit. If you run gpg --edit-key Richie, you'll see the truth:
pub 1024R/EEEEEEEE created: 2013-01-01 expires: never usage: SC
trust: unknown validity: full
sub 1024R/FFFFFFFF created: 2013-01-01 expires: never usage: E
[ unknown] (1). Richard Stallman
[ full ] (2) Richie
Referenced by:
P95436
P95436
Wed 2024-05-29 22:51:48
link
reply
066268a8329e82e5d6493956824496610da825eec043fc1e49d5913ceefc7425.png
64.7 KiB 604x153
P95398
That's why you look at the fingerprint, Skipworth. This is basic stuff. It evens tells you when you verify something (paraphrasing) "There's no indication the key belongs to the user" if the key isn't signed with a trusted key. Anyone can put anything in the email/name fields and claim anything.
There's two possible solutions to this problem: A) Central authority B) Web-of-trust. They chose WoT.
The author even conceeds this point:
>>>>>>>>>>>>>>admin add code tags>>>>>>>>>>>>>>>>>>>>>>
It is NOT certain that the key belongs to the person named
in the user ID. If you *really* know what you are doing,
you may answer the next question with yes.
Use this key anyway? (y/N)
>>>>>>>>>>>admin add code tags>>>>>>>>>>>>>>>>>>>>>>>>>>
This is why you place your fingerprint in a public place, ideally that you control, and in places it will be archived (~/.signature) so it leaves a trail.
Referenced by:
P95453
P95453
Thu 2024-05-30 03:22:47
link
reply
P95436
So if I add another UID (email) to my key will Thunderturd allow me to send PGP email to two different emails no issue or will I have to still make an alias file?
Referenced by:
P95458
P95458
Thu 2024-05-30 03:51:02
link
reply
P95453
Why would a mail client stop you from sending mail anywhere? idgi
If you mean can you have multiple keys, then yes, you can have multiple keys (gpg2 -u $USER).
Referenced by:
P95465
P95465
Thu 2024-05-30 05:14:23
link
reply
P95458
>
https://support.mozilla.org/en-US/kb/thunderbird-help-openpgp-alias
>Thunderbird refuses to use a key with a mismatching email address. By using the Alias Keys Feature, you can override Thunderbird's usual checks, and tell Thunderbird to use a public key anyway.
P95489
Thu 2024-05-30 11:05:50
link
reply
fdd8481bbffed9f9df939b95b066ed113731cdd2d6cea72c2c0a95fcb19ecd3e.jpg
141 KiB 850x1209
>That's why you look at the fingerprint, Skipworth.
boomer id'd at sentence #0 (have to count from 0 or he might not understand)
SHUT THE ***** UP BOOMER SHUT THE ***** UP BOOMER SHUT THE ***** UP BOOMER SHUT THE ***** UP BOOMER
you understand nothing about security, and the fact that you made this conflation proves it. i *expect* this exact reply from 9000 boomers when i post on any normie forum too, youre not even special. now excuse me while i eat the second half of my cake from yesterday
Referenced by:
P95585
P95585
Fri 2024-05-31 02:14:15
link
reply
P95489
Translation from hapa: The hapa was wrong, and is now seething.
>SHUT THE ***** UP BOOMER
Deflecting away from the issue
> i *expect* this exact reply from 9000 boomers when i post
It is obvious that the hapa post was wrong, and the poster is now attempting to explain the obvious away.
>eat the second half of my cake from yesterday
Cold comfort.
P95591
Fri 2024-05-31 03:38:18
link
reply
W*gGeR bOomeRs wilL nEvER stoP usiNG tHEiR BackDoOReD vUln cITy UN*X!
Mod Controls:
x
Reason: