
Alright that's what I figured as well but I wasn't sure. Thanks!saturnalia0 wrote:That being said I don't see why sharing that particular file would be of any concern. If someone was specifically targeting you they could check your useflags to look for software you have with known vulnerabilities (to the attacker), but that seems highly unlikely.
Sorry if I wasn't clear. I meant making moving /etc/portage/package.use into my dotfiles folder, so ~/dotfiles/package.use. Now I make a symbolic link in /etc/portage/ that points to the file in my dotfiles folder.[/b]saturnalia0 wrote:I don't see the point of adding a symlink to version control, so instead of creating a symlink for package.use and adding it to version control, I'd simply not add package.use to version control, without creating a symlink at all.

Just never put your zsh/bash dot files online. Mind you, every sliver of data you share will help in the enumeration of your system, but some data is more valuable;zamlz wrote:My dotfiles repo is public, and I was wondering if there any concern of having my package.use information on there.
I doubt there is, but I would like people's opinion of setting up a symlink for package.use pointing to a file in my dotfiles directory.
Having package.use as a symlink doesn't seem to break anything as far as I can tell...
Muso ... why is that? That is the least likely source of valuable, or exploitable, information. Plus, what would be the ingress?Muso wrote:Just never put your zsh/bash dot files online.

Post exploit, during privilege escalation, checking those is part of the process.khayyam wrote:Muso ... why is that? That is the least likely source of valuable, or exploitable, information. Plus, what would be the ingress?Muso wrote:Just never put your zsh/bash dot files online.
best ... khay
Muso wrote:Just never put your zsh/bash dot files online.
khayyam wrote:Muso ... why is that? That is the least likely source of valuable, or exploitable, information. Plus, what would be the ingress?
Musu ... what? You'll have to explain.Muso wrote:Post exploit, during privilege escalation, checking those is part of the process.

https://blog.g0tmi1k.com/2011/08/basic- ... scalation/khayyam wrote:Muso wrote:Just never put your zsh/bash dot files online.khayyam wrote:Muso ... why is that? That is the least likely source of valuable, or exploitable, information. Plus, what would be the ingress?Musu ... what? You'll have to explain.Muso wrote:Post exploit, during privilege escalation, checking those is part of the process.
best ... khay
Muso wrote:Just never put your zsh/bash dot files online.
khayyam wrote:Muso ... why is that? That is the least likely source of valuable, or exploitable, information. Plus, what would be the ingress?
Muso wrote:Post exploit, during privilege escalation, checking those is part of the process.
khayyam wrote:Musu ... what? You'll have to explain.
Muso ... that explains nothing, so again, what sort of exposure exists from "put[ing] zsh/bash dot files online"?

Specifically, sharing them online. As I said in my initial post, every sliver of data you share helps in the enumeration of your system. The history of commands entered is not something one should share.khayyam wrote:Muso wrote:Just never put your zsh/bash dot files online.khayyam wrote:Muso ... why is that? That is the least likely source of valuable, or exploitable, information. Plus, what would be the ingress?Muso wrote:Post exploit, during privilege escalation, checking those is part of the process.khayyam wrote:Musu ... what? You'll have to explain.Muso ... that explains nothing, so again, what sort of exposure exists from "put[ing] zsh/bash dot files online"?
best ... khay

Why would anyone include such a file in a repo? There is nothing requiring everything under ~/.* to be included. Only files like .bashrc and .vimrc would go to the repo. Naturally if .bashrc (or any other run control script really) that still contains something sensitive like a password, it's the owner's own damn fault for making it public.Muso wrote: Example, mistyping su, hitting enter, then typing the root password and hitting enter gets your root password stored in your ~/.zsh_history file. That sort of information should not be shared online.
Isn't that asked of most security missteps? Maybe they didn't think of it, made a mistake, didn't know better.kitsunenokenja wrote:Why would anyone ...?

I'm just being thorough. People do all sorts of weird things.kitsunenokenja wrote:Why would anyone include such a file in a repo? There is nothing requiring everything under ~/.* to be included.Muso wrote: Example, mistyping su, hitting enter, then typing the root password and hitting enter gets your root password stored in your ~/.zsh_history file. That sort of information should not be shared online.
khayyam wrote:Muso ... that explains nothing, so again, what sort of exposure exists from "put[ing] zsh/bash dot files online"?
Muso ... "specifically, sharing them online" is not an answer, it's stated in the question. You shouldn't share them online, because that would be sharing them online? As for "every sliver of data", what kind of data (excluding history, because these are are not considered dotfiles)? Are you saying I shouldn't include my social security number, DoB, and such, in my .zshrc? There is nothing to be gleaned from zsh/bash dotfiles under every normal circumstance, unless your saying that some alias, or function, exposes something of the host system. So, saying "never put your zsh/bash dot files online" is just nonsense, you might as well say "don't put your SSN, DoB, etc, in your dotfiles and then post them online" ... which might be considered in some far off circumstance "good advice", but it's no reason for thinking that the content of zsh/bash dotfiles are exposing anything.Muso wrote:Specifically, sharing them online. As I said in my initial post, every sliver of data you share helps in the enumeration of your system. The history of commands entered is not something one should share.