Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
[Enhancement] Grant root access to applications #236
Comments
FrancescoAnconia
changed the title from
Grant root access to application
to
[Enhancement] Grant root access to application
Apr 13, 2016
FrancescoAnconia
changed the title from
[Enhancement] Grant root access to application
to
[Enhancement] Grant root access to applications
Apr 13, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thelifeofjay
Apr 13, 2016
Contributor
This won't be happening.
Rooting and granting root to applications is not what CopperheadOS is about. Cyanogenmod may very well offer certain functionality but they are not in the security business. Granting applications (that may have various stages of vulnerabilities or developer issues) privileged access can undermine the security of the ROM.
|
This won't be happening. Rooting and granting root to applications is not what CopperheadOS is about. Cyanogenmod may very well offer certain functionality but they are not in the security business. Granting applications (that may have various stages of vulnerabilities or developer issues) privileged access can undermine the security of the ROM. |
thestinger
added
Type: enhancement
Status: wontfix
labels
Apr 14, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Apr 14, 2016
Contributor
There's no reason features like a configuration UI for the firewall need root access exposed to applications. CopperheadOS is not going to break Android's security model by exposing a huge whole like that. CyanogenMod's su is a privilege escalation hole exposed to the whole OS. Bugs in the su implementation are local root vulnerabilities. We found and reported some ourselves and there are going to be more.
|
There's no reason features like a configuration UI for the firewall need root access exposed to applications. CopperheadOS is not going to break Android's security model by exposing a huge whole like that. CyanogenMod's su is a privilege escalation hole exposed to the whole OS. Bugs in the su implementation are local root vulnerabilities. We found and reported some ourselves and there are going to be more. |
thestinger
closed this
Apr 14, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
vanitasvitae
Apr 14, 2016
You can flash superuser from recovery if you need root access. I'm using superuser from phhusson (http://superuser.phh.me/). Keep in mind that this adds to the attack surface though.
vanitasvitae
commented
Apr 14, 2016
|
You can flash superuser from recovery if you need root access. I'm using superuser from phhusson (http://superuser.phh.me/). Keep in mind that this adds to the attack surface though. |
thestinger
added
Status: wontimplement
and removed
Status: wontfix
labels
Apr 15, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
FrancescoAnconia
Apr 15, 2016
Thanks for your answers. I understand your reasons to not provide such functionality in the standard build. However, I need root access to install orwall (or orbot as transparent proxy) and snoopsnitch on our devices. Maybe you could integrate such tools in the standard or an enhanced build in a future release? In the meantime I'll try the solution vanitasvitae proposed.
FrancescoAnconia
commented
Apr 15, 2016
|
Thanks for your answers. I understand your reasons to not provide such functionality in the standard build. However, I need root access to install orwall (or orbot as transparent proxy) and snoopsnitch on our devices. Maybe you could integrate such tools in the standard or an enhanced build in a future release? In the meantime I'll try the solution vanitasvitae proposed. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Apr 15, 2016
Contributor
Orbot does now have support for using Android's VPN support for transparent proxying.
|
Orbot does now have support for using Android's VPN support for transparent proxying. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
onodera-punpun
Jan 11, 2017
Sorry for necro posting, but @vanitasvitae could you please elaborate some more on how to do this?
onodera-punpun
commented
Jan 11, 2017
|
Sorry for necro posting, but @vanitasvitae could you please elaborate some more on how to do this? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
fschwebel
Feb 7, 2017
You know the story about Linux not preventing people from doing stupid things, in order to allow them to do intelligent things? Well, it seems to me that you took the opposite decision here. And by doing so you are also leaving the privacy of users as compromised as it is on AOSP, with the pretext of not "breaking Android's security model", which is flawed. You also seem terribly sure of this decision, while it doesn't look to me as sound as you seem to think it is. I mean that in a respectful way of course as I love the project, but you really don't think it could make sense?
fschwebel
commented
Feb 7, 2017
•
|
You know the story about Linux not preventing people from doing stupid things, in order to allow them to do intelligent things? Well, it seems to me that you took the opposite decision here. And by doing so you are also leaving the privacy of users as compromised as it is on AOSP, with the pretext of not "breaking Android's security model", which is flawed. You also seem terribly sure of this decision, while it doesn't look to me as sound as you seem to think it is. I mean that in a respectful way of course as I love the project, but you really don't think it could make sense? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thelifeofjay
Feb 7, 2017
Contributor
@fschwebel correct - we are absolutely certain we will not be granting Root access to applications for CopperheadOS. Please note that this thread is closed. Rehashing arguments will only irritate the product's developers.
|
@fschwebel correct - we are absolutely certain we will not be granting Root access to applications for CopperheadOS. Please note that this thread is closed. Rehashing arguments will only irritate the product's developers. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Feb 7, 2017
Contributor
And by doing so you are also leaving the privacy of users as compromised as it is on AOSP
I don't understand what that's supposed to mean. Reducing the security of the system does not increase privacy. Privacy and security features should be properly implemented rather than hacked together based on requiring root access at the application layer which otherwise does not exist at all for very good reasons. An application with root access is a huge extra attack surface that's not otherwise there, not to mention the root implementation itself and the holes it makes in the security model.
I don't understand what that's supposed to mean. Reducing the security of the system does not increase privacy. Privacy and security features should be properly implemented rather than hacked together based on requiring root access at the application layer which otherwise does not exist at all for very good reasons. An application with root access is a huge extra attack surface that's not otherwise there, not to mention the root implementation itself and the holes it makes in the security model. |
FrancescoAnconia commentedApr 13, 2016
It would be great to have a possibility to grant root access to selected application, such as firewalls, IMSI catcher etc. Cyanogenmod offers this feature in the developer options.