I noticed Debian does this by default and Arch wiki recommends is citing improved security and upstream.

I don’t get why that’s more secure. Is this assuming torrents might be infected and aims to limit what a virus may access to the dedicated user’s home directory (/var/lib/transmission-daemon on Debian)?

  • Quail4789@lemmy.mlOP
    link
    fedilink
    English
    arrow-up
    3
    ·
    9 months ago

    Isn’t that a risk for anything downloaded, assuming I run transmission as my user, not root?

      • Quail4789@lemmy.mlOP
        link
        fedilink
        English
        arrow-up
        2
        ·
        9 months ago

        My user is, yes. But there has to be an exploit in sudo for the program to elevate itself using it without the user knowing, no? It’s possible for sure but I’m seeing this type of a precaution on a torrent client for the first time.

          • nanook@friendica.eskimo.com
            link
            fedilink
            arrow-up
            1
            ·
            9 months ago

            @BaumGeist @Quail4789 If you get software from an untrusted source, and it does not matter if it’s a torrent, ftp, https, scp, etc, you run this risk. And usually when you download with a torrent the supplying site will publish a hash which you can compare to make sure that it wasn’t corrupted in transit.

        • nanook@friendica.eskimo.com
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          9 months ago

          @Quail4789 @rc__buggy@sh.it just.works there is not a known exploit in sudo but there IS a known exploit in the library it uses to elevate privileges, at least in older versions. Also I make full system weekly backups so worst comes to worst I’m never going to lose more than a weeks data.

      • mik@sh.itjust.works
        link
        fedilink
        arrow-up
        5
        ·
        9 months ago

        It may be mostly “security theater” but it requires almost no extra effort and drastically increases the difficulty of compromise by adding privilege escalation as another requirement to gaining root access.

      • Quail4789@lemmy.mlOP
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 months ago

        Has there ever been such an exploit? Given all other torrent clients I’ve seen just run as your user by default, is there something different in transmission over others that make it more vulnerable?

        • loutr@sh.itjust.works
          link
          fedilink
          arrow-up
          4
          ·
          9 months ago

          The point is also to minimize potential damages caused by a bug in the software. Just this year there have been multiple data-destroying bugs in publicly released software. If the app runs as a server it’s usually trivial to have it run as a dedicated user, with just enough permissions to do its job.

          It’s just good practice, even though the risks might be low why risk it at all?

        • The Ramen Dutchman@ttrpg.network
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          Not yet, but if every system was only protected against what already happened instead of also what could happen, we’d get hacked a lot more often!