72
submitted 1 year ago by sebastiancarlos to c/linux@lemmy.ml

Almost every program that we run has access to the environment, so nothing stops them from curling our credentials to some nefarious server.

Why don't we put credentials in files and then pass them to the programs that need them? Maybe coupled with some mechanism that prevents executables from reading any random file except those approved.

all 36 comments
sorted by: hot top controversial new old
[-] cizra@lemm.ee 70 points 1 year ago

Environments are per-process. Every program can have its own environment, so don't inject secrets where they're not needed.

I'm using bubblewrap to restrict access to FS.

[-] cybersandwich@lemmy.world 36 points 1 year ago

I am not familiar with the software bubblewrap so I am just picturing your hard drives wrapped up inside your case.

[-] GlitchyDigiBun@lemmy.dbzer0.com 29 points 1 year ago

That's an old white-hat trick. If the tables drop, the wrap helps them bounce.

[-] ReversalHatchery@beehaw.org 21 points 1 year ago* (last edited 1 year ago)

The environment of other processes is readable in procfs.

/proc/PID/environ

Thanks to the permissions it's read-only, and only by the user with which the process runs, but it's still bad, I think

[-] Lojcs@lemm.ee 7 points 1 year ago

Don't all programs run as the user anyways? That changes nothing on a single user machine

[-] hansl@lemmy.ml 15 points 1 year ago

A proper server should have one user per service.

[-] PuppyOSAndCoffee@lemmy.ml 0 points 1 year ago

yay password rotation month

[-] fahfahfahfah@lemmy.billiam.net 7 points 1 year ago

Service users generally don’t have passwords

[-] lemmyvore@feddit.nl 3 points 1 year ago

You don't login as service users, they're just a means of taking advantage of the user separation features. They have the login shell set to /bin/false typically.

[-] yum13241@lemm.ee 2 points 1 year ago
[-] russjr08@outpost.zeuslink.net 3 points 1 year ago

From a quick search I've just done, the major difference is that /bin/false can't return any text, the only thing it can do as specified via POSIX standards is return false.

So if you set someone's shell to /bin/nologin there can be some text that says "You're not allowed shell access", similar to what happens if you try to SSH into say GitHub.

Of course, for a service account that won't be operated by a person, that doesn't matter - so whichever one you use is just whichever the operator thought of first, most likely.

[-] PuppyOSAndCoffee@lemmy.ml 1 points 1 year ago

true dat; false trends to CVE vs nologin

[-] 30p87@feddit.de 4 points 1 year ago

Some have their own users, like gitlab

[-] Max_P@lemmy.max-p.me 33 points 1 year ago

I have a rule that credentials in environment variables are to only ever be loaded as needed via some sort of secrets manager, optionally adding a wrapper script to do so transparently.

The whole point of passing secrets as environment variables is to avoid having things in files in plain and in known locations easy to scrape up by any malware.

Now we have people going full circle and slapping those into a .env file.

[-] selawdivad@lemm.ee 3 points 1 year ago

But how do you authenticate to your secret manager? How do you prevent evil scripts from also doing this?

[-] Max_P@lemmy.max-p.me 2 points 1 year ago

I type my password, or on the work MacBook, TouchID. I'd imagine yubikeys would do too.

[-] staticlifetime@kbin.social 1 points 1 year ago

You could decrypt a GPG key-based file to do that.

[-] _e____b@lemmy.world 2 points 1 year ago

I'd be very thankful for an example of your setup. I'm using Bitwardern for browser-related password management, but for convenience scripts I load the credentials as env vars at login through .bash_profile 😅

[-] Max_P@lemmy.max-p.me 4 points 1 year ago

Basically just have each sets of credentials in a script, and whenever you need to use something that needs a key, you source the script you need first.

Then each of those scripts are something like

export MY_API_KEY="$(bw get password whatever)"
[-] _e____b@lemmy.world 1 points 1 year ago
[-] Lowkeylyes@infosec.pub 26 points 1 year ago

No no see the credentials have been towed outside the environment.

[-] Albbi@lemmy.ca 12 points 1 year ago

The frontend fell off!

[-] markstos@lemmy.world 22 points 1 year ago

The classic Unix user and permission system provides a solution for this.

Create a user for the app you are worried about. Make the environment variables available to that user only.

Other apps can’t read the secrets, and if the app itself gets exploited, it has access to the secrets in any case.

[-] bruce965@lemmy.ml 11 points 1 year ago

I suppose in a well configured Docker or Kubernetes environment this doesn't matter that much. Also, in Kubernetes, "secrets" can be passed as read-only files.

[-] erwan@lemmy.ml 10 points 1 year ago

If you run a binary written with bad intentions, you're doomed anyway.

This is the security model we have currently.

[-] PuppyOSAndCoffee@lemmy.ml 7 points 1 year ago* (last edited 1 year ago)

CRED=$(fancy-get-cred) do-stuff

do-stuff has ${CRED} but nothing else does. wrap in a shell script.

[-] catchy_name@feddit.it 5 points 1 year ago

CyberArk is a commercial product that attacks this problem space. It puts an agent process on the host next to your app. Only processes whose fingerprint matches those authorized to access a credential are allowed to fetch it. That fingerprint can be based on the host (known list of production hosts), the os user ID that owns the pid, the path to the executable for the pid, and probably a few more items.

Under that model your app just needs to know the environment that it wants (inject however you want) and the userid it wants to use. At runtime it reaches out to the local cyberark agent to obtain the password secret.

[-] markstos@lemmy.world 6 points 1 year ago

Under this model, a proprietary, closed source process can access all your secrets.

[-] PuppyOSAndCoffee@lemmy.ml 1 points 1 year ago* (last edited 1 year ago)

great point...is there an open source equivalent?

[-] superbirra@lemmy.world 1 points 1 year ago

no, because there are superior approaches already, some of them you can find in this post

[-] conciselyverbose@kbin.social 5 points 1 year ago

What's the goal?

There are extra steps you can take to try to improve the security against malware, but using environment variables instead of hard coding isn't really intended for that, I don't think.

It's just to stop accidental leaks with stuff like git and other code sharing.

[-] GBU_28@lemm.ee 5 points 1 year ago

Global credentials are yuck

this post was submitted on 18 Aug 2023
72 points (91.9% liked)

Linux

46611 readers
1321 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS