aboutsummaryrefslogtreecommitdiff
path: root/doc/manual/src/installation/nix-security.md
diff options
context:
space:
mode:
Diffstat (limited to 'doc/manual/src/installation/nix-security.md')
-rw-r--r--doc/manual/src/installation/nix-security.md11
1 files changed, 5 insertions, 6 deletions
diff --git a/doc/manual/src/installation/nix-security.md b/doc/manual/src/installation/nix-security.md
index d5ae7535d..66febe907 100644
--- a/doc/manual/src/installation/nix-security.md
+++ b/doc/manual/src/installation/nix-security.md
@@ -7,9 +7,8 @@ management operations. All other users can then use the installed
packages, but they cannot perform package management operations
themselves.
-Alternatively, you can configure Lix in “multi-user mode”. In this
-model, all users can perform package management operations — for
-instance, every user can install software without requiring root
-privileges. Lix ensures that this is secure. For instance, it’s not
-possible for one user to overwrite a package used by another user with a
-Trojan horse.
+Alternatively, you can configure Lix in “multi-user mode”. In this model, all users can perform package management operations — for instance, every user can install software for themselves without requiring root privileges.
+Lix does its best to ensure that this is secure.
+For instance, it would be considered a serious security bug for one untrusted user to be able to overwrite a package used by another user with a Trojan horse.
+
+Nevertheless, the Lix team does not consider multi-user mode a strong security boundary, and does not recommend running untrusted user-supplied Nix language code on privileged machines, even if it is secure to the best of our knowledge at any moment in time.