Git Product home page Git Product logo

anotterkiosk's People

Contributors

manawyrm avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

anotterkiosk's Issues

pi user being able to sudo

With the current Raspberry Pi images being downloaded, the pi user is allowed to call sudo nopasswd.
This isn't required for anything and is a pretty unnecessary security risk.
Administrative tasks can be done using SSH login as root.

x86 images are probably not affected (as the pi user is being created newly and shouldn't be in the sudoers/wheel group)

See #2 (comment)

Create a Rocky Linux version

Hello, Thank you for this project.

Hope you continue it and add features to make it the best.

I was thinking if you could consider doing a version of AnotterKiosk using Rocky Linux 9, or switching entirely to it.

Rocky (CentOS-RHEL) is proved to be a much more stable and reasonable distro overall, And i think it would be a nice move for this project since its in is early phase (before V1).

Considering too the security issues mentioned on the readme to be solved in near versions, it would make sense to correct them whenever possible with the advantage of a cleaner distro like Rocky and also make use of SELinux (past V1 maybe).

Thanks again, Have a nice day

If you need any tips, advice or help , hmu
Cheers!

Wireguard tunnel support

Similar to AutoSSH, it would be very nice and useful to have Wireguard tunneling support.
This could even extend to routing the default gateway through the tunnel, in order to allow for access to private websites and/or internal systems.

It would require some sort of DNS resolve cronjob as Wireguard isn't capable of handling that itself and it would probably also require some sort of external tunnel watchdog.

See #2 (comment)

Pad Chromium in bubblewrap

bubblewrap is a nice little sandboxing tool, which (amongst other things) allows users to filter syscalls of a process.
The Chromium process could be limited to a very small number of syscalls, limiting the attack surface against the linux kernel.

A successful exploit would then need:

  • a Chromium exploit (V8, etc.)
  • a sandbox escape
  • bubblewrap escape (with limited syscalls from a non-privileged user)
  • Linux kernel local privilege escalation (from user to root/kernel)

Clean up webserver permission handling

Currently, the www-data user (and nginx/webserver) is being able to sudo to the root user.
This still requires an exploit in the (relatively small amount of) PHP code on the system, but other issues in PHP-FPM or nginx might endanger the system here.

It's not required to have sudo permissions, if the system statistics reporting would be done by an external service.

See #2 (comment)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.