← Back to context

Comment by dgxyz

1 day ago

Well technically Unixes like Linux are a mountain of legacy and they are fine.

Windows is just a mountain of shit.

> a mountain of legacy and they are fine.

telnetd CVE-2026-24061. It's embarrassingly simple exploit but took years to be discovered.

> When telnetd invokes /usr/bin/login, it passes the USER value directly. If an attacker sets USER=-f root and connects using telnet -a or --login, the login process interprets -f root as a flag to bypass authentication, granting immediate root shell access.

"Fine"

Why does every Linux distro under the sun try so hard to protect the garbage under /usr/bin/ and /etc/ when literally the only files that matter to me are in /home, which is a free-for-all?

  • Because Linux (and other nixes) have their root in multiuser/time-share systems/servers. Protecting the system* from the users was important, and protecting users from other users equally as important. Protecting the user's $HOME from themselves/user-level programs wasn't as much of a concern, the user was assumed to be responsible enough to manage it themselves.

  • Linux /home is far from a free for all. flatpak, landlock, selinux, podman, firejail, apparmor, and systemd sandboxing all exist and can and do apply additional restrictions under /home

  • Canonical and Red Hat have been modernising things for a long time, albeit slowly. Most funds went into server components.

    As for the desktop community… Well, it has a severe lack of professionals.

  • >Why does every Linux distro under the sun try so hard to protect the garbage under /usr/bin/ and /etc

    Because a compromised user could infect shared executables and spread the infection. A bit harder to do with etc but for sure possible. The main target would be infecting bash and you are done from the get go.

    >when literally the only files that matter to me are in /home, which is a free-for-all?

    The home folder's read write is usually restricted to the user. The only scenario where this isn't the case to my knowledge is Ubuntu where others can read it, but this is just a huge flaw in Ubuntu that almost no other distro has.

    • > when literally the only files that matter to me are in /home, which is a free-for-all?

      > The home folder's read write is usually restricted to the user.

      Yeah, and that is the point. All user's programs including curl, wget, the web browser, anything else that connects to the network run as the user, and all the user's programs, by default, have access to everything inside ${HOME}.

      Most people don't really care if /bin gets obliterated, but they do care dearly when /home/joe/photos/annies-2nd-birthday gets wiped.

      9 replies →

  • The first point is fairly obvious and the latter point is not true (AppArmor etc)

    • Phew, I'm so relieved that now we have the One True Security Solution To Rule Them All, AppArmor.

      Oh, what do you mean there's also SELinux, Snap, Flatpack, Docker, Podman, ...?

      3 replies →

Unixes like Linux are not immune.

  • True, as systemd and wayland point out elegantly. But at least there is a modicum of choice there.

    • Ironic in a post about a CVE, as systemd offers more security options for starting services than anything else.