How/why does npm recommend not running as root?

前端 未结 3 1516
说谎
说谎 2020-11-30 19:43

In short...

First of all, why does npm suggest that it should only run as non-root? I highly disbelieve that every other package manager (apt, y

相关标签:
3条回答
  • 2020-11-30 19:57

    The simple answer is web servers should never be run as root for well known security reasons, so this goes for npm commands as well.

    To start fresh, remove prior Node.js and npm installs as well as these files/directories:

    mv ~/.npmrc       ~/.npmrc~prior
    mv ~/.npm         ~/.npm~prior
    mv ~/tmp          ~/tmp.~prior
    mv ~/.npm-init.js ~/.npm-init.js~prior
    

    Solution: Install Node.js (which comes with npm) as NON root (no sudo)

    Download Source Code directly from https://nodejs.org/en/download/

    Execute the below as yourself (Linux/OS X)

    cd node-v8.1.2  # into expanded source dir
    
    export NODE_PARENT=${HOME}/node-v8.1.2 # put this into your ~/.bashrc
    

    Feel free to change above export to whatever location is appropriate

    ./configure   --prefix=${NODE_PARENT}
    make -j4   # for dual core ... use  -j8  for quad core CPU
    make install
    

    which puts the binaries for Node.js and npm as well as its modules repository into $NODE_PARENT, a $USER owned dir which then allows you to issue subsequent npm install xxx commands as yourself.

    To reach the binaries for node and npm alter your PATH environment variables in your ~/.bashrc:

    export PATH=${NODE_PARENT}/bin:${PATH}
    export NODE_PATH=${NODE_PARENT}/lib/node_modules
    

    Then to install packages into that directory (global), as opposed to the current directory (local) always pass in the -g flag (global):

    npm install -g someModule
    

    NOTE - at no time are you executing anything npm or node related as root / sudo.

    0 讨论(0)
  • 2020-11-30 20:09

    Actually, npm does not recommend not running as root. Well, not any more.

    It has changed around the same time that you asked your question. This is how the README looked like on February 7, 2011: "Using sudo with npm is Very Not Recommended. Anyone can publish anything, and package installations can run arbitrary scripts." It was explained later in more detail as "Option 4: HOLY COW NOT RECOMMENDED!! You can just use sudo all the time for everything, and ignore the incredibly obnoxious warnings telling you that you're insane for doing this."

    See: https://github.com/isaacs/npm/tree/7288a137f3ea7fafc9d4e7d0001a8cd044d3a22e#readme

    Now it is actually considered a recommended technique of installing npm:

    Simple Install - To install npm with one command, do this:

    curl http:/ /npmjs.org/install.sh | sudo sh

    See: https://github.com/isaacs/npm/tree/99f804f43327c49ce045ae2c105995636c847145#readme

    My advice would be to never do it because it means basically this:

    1. find out what the local DNS (or anyone else spoofing the DNS response or poisoning the DNS cache) says is the IP address of npmjs.org
    2. connect with insecure TCP with that IP (or with whoever says it's his IP) on port 80
    3. trust the router that you think you should talk to (or anyone who gave you the DHCP response said you should talk to) to deliver packets to the right host
    4. possibly go through another layer of transparent caching proxy
    5. trust all other networks between you and the other end of the TCP connection
    6. don't know for sure who you are connected with
    7. cross your fingers
    8. request install.sh script over insecure HTTP with no verification whatsoever
    9. and then run whatever was returned by whoever you're talking to with maximum privileges on your machine without even checking what is it.

    As you can see this is really, literally, with no exaggeration giving root shell to whatever you get after asking for a script from the Internet over an insecure connection with no verification whatsoever. There are at least 5 different things that can go wrong here, any of which can lead to an attacker taking total control over your machine:

    1. DHCP spoofing
    2. ARP spoofing
    3. DNS cache poisoning
    4. DNS response spoofing
    5. TCP session hijacking

    Also note that using 'sh' instead of 'sudo sh' is usually not any less risky unless you run it as a different user who doesn't have access to your private data, which is usually not the case.

    You should use HTTPS connections if available to download such scripts so you could at least verify who you are talking to, and even then I wouldn't run it without reading first. Unfortunately npmjs.org has a self-signed certificate so it doesn't really help in this case.

    Fortunately npm is available on GitHub that has a valid SSL certificate and from where you can download it using secure connection. See: github.com/isaacs/npm for details. But make sure that the npm itself doesn't use insecure connections to download the files that it downloads - there should be an option in npm config.

    Hope it helps. Good luck!

    0 讨论(0)
  • 2020-11-30 20:11

    Another reason for not installing NPM packages under root is that it will cause you to face file access problem with packages that are using node-gyp (ex: node-sass) because it builds C++ libs and those are not in the local node_modules folder.

    0 讨论(0)
提交回复
热议问题