(no title)
jbroman | 6 years ago
This isn't tmux's fault; this is fundamentally the sort of thing that's possible under the security model of modern Linux desktops.
jbroman | 6 years ago
This isn't tmux's fault; this is fundamentally the sort of thing that's possible under the security model of modern Linux desktops.
Spivak|6 years ago
Not with most default sudo configurations. Your sudo ticket exists outside your control as a regular user and, by default, is bound to your tty. An attacker controlling another terminal can't convince sudo to execute commands with your ticket.
> manipulate the memory of your terminal emulator
On some distros this might work but you can absolutely flip a switch to disallow processes running as the same user to access each-other's memory. On secure systems this causes devs a lot of annoyance since they cant attach a debugger.
jolmg|6 years ago
You can still attach a debugger on a newly created process, but if you want to attach to an already running process, you just need sudo. It's not really annoying.
87zuhjkas|6 years ago
How about controlling not another, but the same root terminal via send keys without tmux with another xorg terminal window?
jchw|6 years ago
The memory modification one sounds truly not possible. In Windows it is possible via OpenProcess and WriteProcessMemory to modify other process memory under some circumstances, but I do not think the same thing is generally possible under Linux (because in most distros ptrace has been mostly locked down for a few years now)
joshklein|6 years ago
Fnoord|6 years ago
Tmux is part of the OpenBSD base system.
Tmux is not an officially developed program by the OpenBSD community.
It was imported June 1 2009.
Here is Theo de Raadt's post:
> By Theo de Raadt () on 2009-07-07 04:37
> The most impressive thing about tmux, in my view, is how frustrating the code audit was. In 2 hours, I found only one or two nits that had very minor security consequences.
> It was not accepted into the tree based on license alone. It is high quality code.
[1] https://en.wikipedia.org/wiki/OpenBSD#Subprojects
[2] https://undeadly.org/cgi?action=article&sid=20090707041154
zokier|6 years ago
athms|6 years ago