Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] "uVirtus Linux, encrypted OS for Syria": a security review

KheOps kheops at
Fri Feb 7 04:42:00 PST 2014

Hash: SHA1

On Fri, Feb 07, 2014 at 11:25:31AM +0200, Maxim Kammerer wrote:
> On Fri, Feb 7, 2014 at 2:37 AM, Sahar Massachi <Sahar at> wrote:
> > The fact that there's a "naked sudo" hole is brutal.
> >
> > Forgive me if I misunderstand the problem, but how could *anyone* ship a
> > distribution with a passwordless sudo? That seems like it requires
> > deliberate malice to even set up.
> Careful here: Tails had passwordless sudo prior to v0.11, less than 2
> years ago. So either unlimited local root access is not such a big
> deal, or recommendation to use Tails is short-sighted — in either case
> the report has a problem. I suggest that the report author sweeps both
> issues under the carpet simultaneously using a politically correct
> language referencing problems that were taken care of a long time ago,
> and are not that critical to begin with.

There may be two differents things mixed here.

First, recommending the use of Tails instead of uVirtus is not just
related to the passwordless root access. You probably noticed by reading
the report that there are numerous other issues in and around uVirtus
that make Tails undoubtedly a safer (and possibly easier to use) choice.
Possibly not the only choice though, as this is mentioned in the
conclusion with a link to a comparative study between IprediaOS, Liberté
Linux, Privatix, Tails and Whonix. The idea was to avoid just saying
"Hey, you're using uVirtus, too bad for you", but to also give a link to
better solutions in overall. It is a misundertanding to think that I
"sweep under the carpet" the root issue and Tails at the same time: I
would perform the same recommendation even without this issue.

Second, on the passwordless issue itself. It may be a matter of
interpretation, but considering that any executable program using "sudo"
can get unlimited access seems problematic to me. As mentioned in the
report, in Syria a common method of attack is to fool users in
downloading and executing malicious programs disguised as something
else. If one manages to have the user do this from uVirtus, it looks to
me quite easy then to perform nasty stuff such as messing around with
the data contained on the local hard disks. Maybe it is not so easy to
do, making the issue "not that critical" as you state, in which case I
think it'd be useful to justify a bit the claim. But then maybe this
depends on other security features of the system you're considering, and
in uVirtus the fact that this issue is surrounded by many others seems
to make it quite critical.

The Tails ChangeLog¹ I found for 0.11 does not seem to explain why the
passwordless root was removed, but my guess would go towards security


Version: GnuPG v2.0.22 (GNU/Linux)


More information about the liberationtech mailing list