Let’s say I want to enforce certain settings, such as the use of a proxy in network settings for certain users.

Isn’t this easily bypassable by for example by installing TOR browser or using a VPN app in the user space?

How does system mangers can be sure users will only use the system as planned by the sysadmin? I’m especially interested in network settings, but in general I would be interested to know more about this/be pointed towards the right direction.

Thank you!

  • @[email protected]
    link
    fedilink
    -22 months ago

    Hopefully smarter people than I chime in, but if the users aren’t part of sudoers then they shouldn’t be able to install anything. However app images exist, and I’m not sure if those TOR out without network control

    • Eager Eagle
      link
      English
      102 months ago

      besides just downloading and running a binary, there are plenty of package managers that work in the user space and don’t need root access.

      • @[email protected]
        link
        fedilink
        -42 months ago

        If you are setting up a secure system though you would only use a package manager that needed sudo

        • @[email protected]
          link
          fedilink
          41 month ago

          Trying to “secure” a turing-complete computer system by some arbitrary limits like that will never work. Unless you manage to directly prevent traffic that isn’t going through your proxy, it’s all pointless as people will just hack stuff together, be it by downloading binaries themselves and placing them in the home dir, or even by running them in-memory.

        • Eager Eagle
          link
          English
          22 months ago

          Who’s setting up the system is not necessarily the same person using it.

      • @[email protected]OP
        link
        fedilink
        English
        12 months ago

        And that would be enough to bypass root settings?

        If someone wants to prevent users to mess with the system should he just disallow downloads entirely/confine the user into an intranet?

        • @[email protected]
          link
          fedilink
          12 months ago

          Depends on the root setting. And depends on your goal. What is the purpose of the proxy? I doubt that it is easy to bypass, but you still could run a Proxy or VPN as user, this would not bypass the proxy but any filtering/blocking would not be possible. Etc