You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to be able to use raw sockets on Linux (and presumably BSD) a program must be run with root privileges which means making Chrome/Chromium suid root. Even if said privileges are dropped immediately after setting CAP_NET_RAW (and presumably CAP_NET_ADMIN for setting promiscuous mode and/or mac spoofing) the security risks are still significantly higher than not having it run as root at all.
The text was updated successfully, but these errors were encountered:
nl255
changed the title
Security implications of Chrome/Chromium running suid root (Linux, possibly BSD).
Security implications of Chrome/Chromium running suid root (Linux, possibly BSD), which is required for raw sockets.
Aug 22, 2020
The proposal appears to mean "TCP/UDP sockets", which are "raw" compared to websockets and HTTP I guess, and not actual raw system sockets. Perhaps it could be renamed to clarify this Apparently someone thought of that, see #10.
In order to be able to use raw sockets on Linux (and presumably BSD) a program must be run with root privileges which means making Chrome/Chromium suid root. Even if said privileges are dropped immediately after setting CAP_NET_RAW (and presumably CAP_NET_ADMIN for setting promiscuous mode and/or mac spoofing) the security risks are still significantly higher than not having it run as root at all.
The text was updated successfully, but these errors were encountered: