this post was submitted on 06 Aug 2023
1131 points (92.7% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54758 readers
295 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] kuberoot@discuss.tchncs.de 23 points 1 year ago (1 children)

WINE is not safe to run malware in, it's not a secure sandbox. AFAIK, anything expecting it can do anything a Linux binary can. (Also, not an emulator, it's in the original name - WINE Is Not an Emulator)

[–] arc@lemm.ee 1 points 1 year ago* (last edited 1 year ago) (1 children)

I know what WINE is and the gist of "Wine is not an emulator". I have used it extensively and for a while it even contained some of my code (not sure if it still does). But it is still emulating but not in the way people think. WINE is not emulating the operating system but it is emulating the interface that an executable interacts with Windows, aka the Win32 APIs and other DLLs.

They even touch on this in their FAQ - *That said, Wine can be thought of as a Windows emulator in much the same way that Windows Vista can be thought of as a Windows XP emulator: both allow you to run the same applications by translating system calls in much the same way. Setting Wine to mimic Windows XP is not much different from setting Vista to launch an application in XP compatibility mode. *

As far as a potentially malicious executable is concerned, you can create a throwaway wine folder to run the thing and delete it as soon as it is done, e.g.

e.g.

export WINEPREFIX=~/tmpwin
winecfg
# disable wininet from libraries tab, remove Z:, unlink all desktop integration folders
wine keygen.exe
# when done...
rm -rf tmpwin

It doesn't matter if keygen.exe is evil because it can write anything it likes to the fake C: and the fake registry and it's blown away. As a precaution disable networking so it can't reach out either. In the extremely unlikely event that keygen.exe had code to detect it was running under WINE, it would still be subject to the permissions of the uid you had run it as, so you could take even more precautions if you felt so inclined. You could even use a dockerized WINE if you felt like it.

[–] kuberoot@discuss.tchncs.de 4 points 1 year ago (1 children)

On the topic of whether or not it's an emulator, sounds like semantics in the end - fair enough, I disagree but you make a fair point.

That said, in terms of security I think it's very important to point it out that it isn't any more secure than running a random Linux executable. In my view, the original comment is advocating for running unknown executables under wine as a security measure, and the further argument is that it's more secure because most attacks don't target that.

Sounds like if people rely on that for security, malware will just start targeting that after people get used to assuming it's safe.

[–] arc@lemm.ee 0 points 1 year ago

I doubt many people are ever going to do what I suggested so the effort / payoff for malware writers makes it very unlikely they'd bother. They'll just assume 99.999% of people running the binary are doing so on Windows and code accordingly. Of course anything is theoretically possible.