Skip to content
Discussion options

You must be logged in to vote

ZBM exposes a lot of filesystem manipulations and other potentially compromising capabilities right from the menu. You can chroot into a boot environment, roll-back snapshots, rewind pool checkpoints or drop to a recovery shell and have your way with the system. Limiting access to the recovery shell would only mitigate one avenue of attack, and incompletely. Because ZBM is written in shell, I assume it would be trivial for a determined user to interrupt its control flow and be dropped to a shell even if we tried to disable the Ctrl+R hot key.

This kind of hardening is not something we are interested in entertaining because it quickly balloons into a major consideration of what features to…

Replies: 2 comments 5 replies

Comment options

You must be logged in to vote
0 replies
Answer selected by rdmitry0911
Comment options

You must be logged in to vote
5 replies
@GregorKopka
Comment options

@rdmitry0911
Comment options

@GregorKopka
Comment options

@rdmitry0911
Comment options

@ahesford
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
3 participants