Audit TPS daemon
This is part of tails/tails#19248.
tails-persistent-storage.service
runs as root and will process untrusted user data.
This issue wants to investigate whether or not an attacker which gained amnesia
-level could use TPS to escalate their privileges (whether in the same session, or after reboot)
-
Build a list of untrusted data that TPS handles -
ask audit -
audits -
follow-up on audit
Attack scenarios
- Think about attack scenarios targeting the on-activated/on-deactivated hooks, which are executed as root using untrusted input (mount destination directories)
- Think about attack scenarios tricking the user into killing arbitrary processes via the conflicting app dialog
Edited by intrigeri