There is already a very indepth technical blog explaning the various security weaknesses of Linux by Madaidan, Whonix’s Security Researcher. This page will attempt to address some of the questions commonly raised in reaction to his blog post."><metaname=authorcontent="Tommy"><linkrel=canonicalhref=https://privsec.dev/os/linux-insecurities/><linkcrossorigin=anonymoushref=/assets/css/stylesheet.8b523f1730c922e314350296d83fd666efa16519ca136320a93df674d00b6325.cssintegrity="sha256-i1I/FzDJIuMUNQKW2D/WZu+hZRnKE2MgqT32dNALYyU="rel="preload stylesheet"as=style><scriptdefercrossorigin=anonymoussrc=/assets/js/highlight.f413e19d0714851f6474e7ee9632408e58ac146fbdbe62747134bea2fa3415e0.jsintegrity="sha256-9BPhnQcUhR9kdOfuljJAjlisFG+9vmJ0cTS+ovo0FeA="onload=hljs.initHighlightingOnLoad()></script>
There is already a very indepth technical blog explaning the various security weaknesses of Linux by Madaidan, Whonix’s Security Researcher. This page will attempt to address some of the questions commonly raised in reaction to his blog post."><metaproperty="og:type"content="article"><metaproperty="og:url"content="https://privsec.dev/os/linux-insecurities/"><metaproperty="article:section"content="os"><metaname=twitter:cardcontent="summary"><metaname=twitter:titlecontent="Linux Insecurities"><metaname=twitter:descriptioncontent="ThereisacommonmisconceptionamongprivacycommunitiesthatLinuxisoneofthemoresecureoperatingsystems,eitherbecauseitisopensourceorbecauseitiswidelyusedinthecloud.Thisishowever,afarcryfromreality.
There is already a very indepth technical blog explaning the various security weaknesses of Linux by Madaidan, Whonix’s Security Researcher. This page will attempt to address some of the questions commonly raised in reaction to his blog post."><scripttype=application/ld+json>{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":2,"name":"Operating Systems","item":"https://privsec.dev/os/"},{"@type":"ListItem","position":3,"name":"Linux Insecurities","item":"https://privsec.dev/os/linux-insecurities/"}]}</script><scripttype=application/ld+json>{"@context":"https://schema.org","@type":"BlogPosting","headline":"LinuxInsecurities","name":"LinuxInsecurities","description":"ThereisacommonmisconceptionamongprivacycommunitiesthatLinuxisoneofthemoresecureoperatingsystems,eitherbecauseitisopensourceorbecauseitiswidelyusedinthecloud.Thisishowever,afarcryfromreality.\nThereisalreadyaveryindepthtechnicalblogexplaningthevarioussecurityweaknessesofLinuxbyMadaidan,Whonix\u0026rsquo;sSecurityResearcher.Thispagewillattempttoaddresssomeofthequestionscommonlyraisedinreactiontohisblogpost.","keywords":["operatingsystem","security","linux"],"articleBody":"ThereisacommonmisconceptionamongprivacycommunitiesthatLinuxisoneofthemoresecureoperatingsystems,eitherbecauseitisopensourceorbecauseitiswidelyusedinthecloud.Thisishowever,afarcryfromreality.\nThereisalreadyaveryindepthtechnicalblogexplaningthevarioussecurityweaknessesofLinuxbyMadaidan,Whonix’sSecurityResearcher.Thispagewillattempttoaddresssomeofthequestionscommonlyraisedinreactiontohisblogpost.Youcanfindtheoriginalarticlehere.\nWhyisLinuxusedonserversifitissoinsecure?Onservers,whilemostoftheproblemsreferencedinthearticlestillexists,theyaresomewhatlessproblematic.\nOnDesktopLinux,GUIapplicationsrununderyouruser,andthushaveaccesstoallofyourfilesin/home.Thisisincontrasttohowsystemdaemonstypicallyrunonservers,wheretheyhavetheirowngroupanduser.Forexample,NGINXwillrunundernginx:nginxonRedHatdistributions,orwww-data:www-dataonDebianbasedones.DiscreationaryAccessControldoeshelpwithfilesystemaccesscontrolforserverprocesses,butisuselessfordesktopapplications.\nAnotherthingtokeepinmindisthatMandatoryAccessControlisalsosomewhateffectiveonservers,ascommonlyrunsystemdaemonsareconfined.Incontrast,ondesktop,thereisvirtuallynoAppArmorprofiletoconfineevenregularlyusedappslikeChromeorFirefox,letalonelesscommonones.OnSELinuxsystems,theseappsrunintheUNCONFINEDSELinuxdomain.\nLinuxserversarelighterthanDesktopLinuxsystemsbyorderofmagnitude,withouthundredsofpackagesanddozensofsystemdaemonsrunninglikeX11,audioservers,printingstack,andsoon.Thus,theattacksurfaceismuchsmaller.\nLinuxHardeningMythsThereisacommonclaiminresponsetoMadaidanthatLinuxisonlyinsecurebydefault,andthatanexperienceusercanmakeitthemostsecureoperatingsystemoutthere,surpassingthelikesofmacOSorChromeOS.Unfortunately,thisiswishfulthinking.ThereisnoamountofhardeningthatonecanreasonablyapplyasausertofixuptheinherentissueswithLinux.\nLackofverifiedbootmacOS,ChromeOS,andAndroidhaveacleardistinctionbetweenthesystemanduserinstalledapplication.Inoversimplifiedterms,thesystemvolumeissignedbytheOSvendor,andthefirmwareandbootloaderworkstomakesurethatsaidvolumehastheauthorizedsignature.Theoperatingsystemitselfisimmutable,andnothingtheuserdoeswillneedorbeallowedtotamperwiththesystemvolume.\nOnLinux,thereisnosuchcleardistinctionbetweenthesystemanduserinstalledapplications.Linuxdistributionsareabunchofpackagesputtogethertomakeasystemthatworks,andthuseverypackageistreatedaspart