Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security implications of Chrome/Chromium running suid root (Linux, possibly BSD), which is required for raw sockets. #21

Closed
nl255 opened this issue Aug 22, 2020 · 2 comments

Comments

@nl255
Copy link

nl255 commented Aug 22, 2020

In order to be able to use raw sockets on Linux (and presumably BSD) a program must be run with root privileges which means making Chrome/Chromium suid root. Even if said privileges are dropped immediately after setting CAP_NET_RAW (and presumably CAP_NET_ADMIN for setting promiscuous mode and/or mac spoofing) the security risks are still significantly higher than not having it run as root at all.

@nl255 nl255 changed the title Security implications of Chrome/Chromium running suid root (Linux, possibly BSD). Security implications of Chrome/Chromium running suid root (Linux, possibly BSD), which is required for raw sockets. Aug 22, 2020
@osmarks
Copy link

osmarks commented Aug 22, 2020

The proposal appears to mean "TCP/UDP sockets", which are "raw" compared to websockets and HTTP I guess, and not actual raw system sockets. Perhaps it could be renamed to clarify this Apparently someone thought of that, see #10.

@ewilligers
Copy link
Collaborator

The confusion will be avoided when #10 is resolved.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants