On Thu, Feb 13, 2020 at 03:22:23PM -0800, tom wrote:
> On Mon, 13 Jan 2020 10:27:40 +0100
> Evilham via Dng <dng@lists.dyne.org> wrote:
> 
> > Hello Enrico,
> > 
> > On dt., gen. 07 2020, Enrico Weigelt wrote:
> > 
> > > What might supposed to be convenience functionality, poses a 
> > > real-life
> > > security threat:
> > >
> > > A user can be tricked be tricked to download malicious code, 
> > > unpack it with
> > > +x permissions (eg. via tar) and execute it by just clicking on 
> > > the icton.
> > > In combination with other techniques (eg. homoglyphs), even more 
> > > experienced
> > > users can be tricked "open" some supposedly harmless file type, 
> > > while Thunar
> > > in fact executes a binary - with full user's privileges. (the 
> > > same approach
> > > is one of the primary infection vectors used by thousands of 
> > > malwares in
> > > Windows world, which already caused gigantic damages).
> > >
> > > Therefore introduce a new setting and only execute programs if 
> > > explicitly
> > > enabled.
> > 
> > 
> > That's great!
> > 
> > Have you tried poking Thunar's developers into merging such a 
> > feature?
> > This is where the developers would like such things: 
> > https://docs.xfce.org/xfce/thunar/bugs
> > 
> > It'd really be the best place for a setting like this to land and 
> > benefit all Thunar users out there (which are not limited to 
> > Debian-like or even Linux, but also include the BSDs).
> > 
> > Cheers!
> > --
> > Evilham
> > _______________________________________________
> > Dng mailing list
> > Dng@lists.dyne.org
> > https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
> 
> If the user is stupid enough to run random binaries from the internet
> no amount of nannyware is going to protect them. All this does is add
> another layer of inconvenience and complexity literal computers users
> have to work around.

The problem is that the user may think he's opening an 
image and it turns out to be an executable.

-- hendrik

> 
> If you have to deal with users like that then set their home
> directory's mount with option noexec.

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to