-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Be more explicit about security implications in project description #1020
Labels
1. Feature request
A request for a new feature
2. Documentation
The issue is related to the user documentation
Comments
matthiasclasen
added
the
2. Documentation
The issue is related to the user documentation
label
Oct 3, 2022
debarshiray
added a commit
to debarshiray/toolbox
that referenced
this issue
Nov 29, 2022
Fallout from bafbbe8 containers#1020
debarshiray
added a commit
to debarshiray/toolbox
that referenced
this issue
Nov 29, 2022
Using the word 'containerized' gives the false impression of heightened security. As if it's a mechanism to run untrusted software in a sandboxed environment without access to the user's private data (such as $HOME), hardware peripherals (such as cameras and microphones), etc.. That's not what Toolbx is for. Toolbx aims to offer an interactive command line environment for development and troubleshooting the host operating system, without having to install software on the host. That's all. It makes no promise about security beyond what's already available on the usual command line environment on the host that everybody is familiar with. containers#1020
debarshiray
added a commit
to debarshiray/toolbox
that referenced
this issue
Nov 29, 2022
Using the word 'containerized' gives the false impression of heightened security. As if it's a mechanism to run untrusted software in a sandboxed environment without access to the user's private data (such as $HOME), hardware peripherals (such as cameras and microphones), etc.. That's not what Toolbx is for. Toolbx aims to offer an interactive command line environment for development and troubleshooting the host operating system, without having to install software on the host. That's all. It makes no promise about security beyond what's already available in the usual command line environment on the host that everybody is familiar with. containers#1020
debarshiray
added a commit
to debarshiray/toolbox
that referenced
this issue
Nov 29, 2022
Using the word 'containerized' gives the false impression of heightened security. As if it's a mechanism to run untrusted software in a sandboxed environment without access to the user's private data (such as $HOME), hardware peripherals (such as cameras and microphones), etc.. That's not what Toolbx is for. Toolbx aims to offer an interactive command line environment for development and troubleshooting the host operating system, without having to install software on the host. That's all. It makes no promise about security beyond what's already available in the usual command line environment on the host that everybody is familiar with. containers#1020
debarshiray
added a commit
to debarshiray/containertoolbx.org
that referenced
this issue
Nov 29, 2022
Using the word 'containerized' gives the false impression of heightened security. As if it's a mechanism to run untrusted software in a sandboxed environment without access to the user's private data (such as $HOME), hardware peripherals (such as cameras and microphones), etc.. That's not what Toolbx is for. Toolbx aims to offer an interactive command line environment for development and troubleshooting the host operating system, without having to install software on the host. That's all. It makes no promise about security beyond what's already available in the usual command line environment on the host that everybody is familiar with. containers/toolbox#1020
Done in #1182 and containers/containertoolbx.org#29 |
debarshiray
added a commit
to containers/containertoolbx.org
that referenced
this issue
Mar 2, 2024
... and slightly shorten the existing text to accommodate it. The second-level manual.md isn't as prime a real estate as the top-level index.md, and Toolbx is too closely associated with Fedora to not highlight how it fits with Fedora Silverblue and Workstation. Secondly, the earlier introductory text was carefully massaged in consultation with various stakeholders over the years to strike the right balance between making it appealing and understable to the casual reader, and technical accuracy and details for those who are intimately familiar with Toolbx. Removing it without careful thought can re-ignite needless debates about topics like security that are best avoided right now [1]. [1] containers/toolbox#183 containers/toolbox#1020
debarshiray
added a commit
to debarshiray/toolbox
that referenced
this issue
Sep 26, 2024
Using the word 'containerized' gives the false impression of heightened security. As if it's a mechanism to run untrusted software in a sandboxed environment without access to the user's private data (such as $HOME), hardware peripherals (such as cameras and microphones), etc.. That's not what Toolbx is for. Toolbx aims to offer an interactive command line environment for development and troubleshooting the host operating system, without having to install software on the host. That's all. It makes no promise about security beyond what's already available in the usual command line environment on the host that everybody is familiar with. containers#1020
debarshiray
added a commit
to debarshiray/toolbox
that referenced
this issue
Sep 26, 2024
Using the word 'containerized' gives the false impression of heightened security. As if it's a mechanism to run untrusted software in a sandboxed environment without access to the user's private data (such as $HOME), hardware peripherals (such as cameras and microphones), etc.. That's not what Toolbx is for. Toolbx aims to offer an interactive command line environment for development and troubleshooting the host operating system, without having to install software on the host. That's all. It makes no promise about security beyond what's already available in the usual command line environment on the host that everybody is familiar with. containers#1020
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
1. Feature request
A request for a new feature
2. Documentation
The issue is related to the user documentation
Is your feature request related to a problem? Please describe.
Quite a few people tend to believe that toolbox is a security mechanism to run untrusted software in a container. This is not really true, as toolbox containers can access all files in the user's home directory and thus cause havoc.
Describe the solution you'd like
Make it more explicit in the project documentation that a toolbox can access all private files of a user and thus does not protect against malicious software. I know that it is written that toolbox provides "access to the user's home directory", but I think it would be good to explicitly spell out that this means that malicious software inside a toolbox can steal, encrypt and delete all your personal data, just like malicious software outside a toolbox.
Describe alternatives you've considered
One could argue that it should be obvious that toolbox does not protect against malicious software, but I think it would be better to explicitly warn about that.
The text was updated successfully, but these errors were encountered: