New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 731796 link

Starred by 1 user

Issue metadata

Status: Untriaged
Owner: ----
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Bug



Sign in to add a comment

Consider running openvpn as non-root

Project Member Reported by jorgelo@chromium.org, Jun 9 2017

Issue description

Some context: https://groups.google.com/a/google.com/d/msgid/chromeos-security-core/CAKUbbxKXQns0yWOiA2CDtKiug8jJOCxn5R4EnrSLegqF-bM55g%40mail.gmail.com

"""
Why is openvpn running as root? You're mentioning it drops privileges internally? The source code suggests it can do set[ug]id() + chroot, but we're only making use of set[ug]id. Given the fact that openvpn doesn't require a lot of system access it might make sense to sprinkle some minijail into the invocation? It'd ideally run with only access to input and output pipes, crypto keys as needed and under a restrictive seccomp filter.
"""
 
Components: Internals>Network>VPN
Labels: Enterprise-Triaged

Sign in to add a comment