Title. Long,short story: creating or editing files with nano
as my non-root user gives (the file) elevated privileges, like I have ran it w/ sudo
or as root. And the (only) “security hole” that I can think of is a nextdns docker container running as root. That aside, its very “overkill” security-wise (cap_drop=ALL, non-root image, security_opt=no_new_privileges, etc.).
It’s like someone tried to hack me but gave up halfway. Am I right or wrong to assume this? Just curious.
Thanks in advance.
Can you be more specific about what you mean by this: “gives (the file) elevated privileges”?
i.e file is created (as non-root), trying to remove the file (once again, as non-root) gives me a “rm: cannot remove 'dir/file.name': Permission denied
” error message.
OK I see. Can you create a new file with nano and then do an “ls -l” so we can see the permissions it’s given? Also provide the output of the command “umask” as the user you’re working with.
Just did it, and it shows my sudoer username with ownership of the created file. umask
returns me 0002.