Ed, I get your point. However, Eclipse running under my user account won't be able to alter my executables in /usr/bin.
Installing some great looking plugin from Marketplace could overwrite Eclipse jars that capture credentials. If it's possible to verify the signature of mission-critical jars at startup, would it make sense to offer it as an option (at the cost of slower startup) ? Denis On 2020-09-25 4:10 a.m., Ed Merks wrote: > > Denis, > > If one has a rogue running process that can write arbitrarily to your > file system (or parts thereof), it could tamper *anything*, so it > would seem that at that point you would have arbitrary security risks > even without an Eclipse IDE. Even Windows doesn't prevent a tampered > or unsigned executable from running. I don't think that Linux even > has signed executables, given there is no signing of such things in > the Tycho builds. > > Looking at this search: > > https://www.google.com/search?q=java+run+only+signed+jars > > and at answers like these: > > https://stackoverflow.com/questions/54011270/allow-a-jar-to-run-only-if-it-is-signed > https://stackoverflow.com/questions/34641305/is-it-possible-to-force-jvm-to-check-that-every-jar-must-be-signed > > suggests that it's not really so feasible to prevent Java from running > unsigned jars, though I expect from Thomas' answer that OSGi can do > verification with its specialized class loader (though presumably that > has a performance impact). > > Running Java with a security manager enabled for the purpose of > running an IDE I think makes zero sense, so generally the IDE can do > anything and can itself be a rogue process (if and when the user > installs arbitrary things from the marketplace). > > Even if the jars are verified, I can still personally think of a > number of ways that I could tamper data files used by the IDE that > would make the IDE "do bad things". I'll not outline the possible > ways that I can think of... :-P > > I think a fundamental aspect (assumption?) of security is that the > machine itself is secure, sufficiently so that a process that does > rogue things never runs in the first place. Verifying signatures and > checksums ensures that only known content is downloaded and installed > in order to keep the machine secure. > > Regards, > Ed > > On 24.09.2020 19:53, Denis Roy wrote: >> >> So it's possible for another process to tamper with jars and have >> Eclipse run them blindly. >> >> Do we know if that is industry practice? >> >> >> >> On 2020-09-24 12:07 p.m., Thomas Watson wrote: >>> Yes, p2 verifies the signatures and content of the JARs to confirm >>> it hasn't been tampered with before installing the JAR. At runtime >>> the verification of JARs is not enabled by default. Otherwise what >>> you did would have resulted in a runtime exception for the class you >>> changed. >>> >>> >>> Tom >>> >>> >>> >>> >>> ----- Original message ----- >>> From: Wim Jongman <wim.jong...@gmail.com> >>> Sent by: cross-project-issues-dev-boun...@eclipse.org >>> To: Cross project issues <cross-project-issues-dev@eclipse.org> >>> Cc: >>> Subject: [EXTERNAL] [cross-project-issues-dev] (Mirror) security >>> Date: Thu, Sep 24, 2020 10:18 AM >>> >>> Hi, >>> >>> This is probably a silly question but I was wondering how we >>> protect the content of jar files as they are being pulled from >>> mirrors all over the world. >>> >>> Due to a recent break in the Platform class, I compiled my own >>> version of the Platform class where I re-added the removed >>> method. Then I replaced it in the plugins/o.e.c.runtime jar >>> using 7-zip. >>> >>> This solved my issue but it also made me wonder how this was >>> protected if some mirror-server user used the same hack to dope >>> our jars. >>> >>> I assume this is being done by p2 when downloading the jar files >>> by comparing some MDA hash? >>> >>> Please enlighten me. >>> >>> Cheers, >>> >>> Wim >>> _______________________________________________ >>> cross-project-issues-dev mailing list >>> cross-project-issues-dev@eclipse.org >>> To unsubscribe from this list, visit >>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev >>> >>> >>> >>> >>> _______________________________________________ >>> cross-project-issues-dev mailing list >>> cross-project-issues-dev@eclipse.org >>> To unsubscribe from this list, visit >>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev >> -- >> >> *Denis Roy* >> >> *Director, IT Services | **Eclipse Foundation, Inc.* >> >> /Eclipse Foundation/ <http://www.eclipse.org/>/: The Platform for >> Open Innovation and Collaboration/ >> >> Twitter: @droy_eclipse >> >> >> _______________________________________________ >> cross-project-issues-dev mailing list >> cross-project-issues-dev@eclipse.org >> To unsubscribe from this list, visit >> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev > > _______________________________________________ > cross-project-issues-dev mailing list > cross-project-issues-dev@eclipse.org > To unsubscribe from this list, visit > https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev -- *Denis Roy* *Director, IT Services | **Eclipse Foundation, Inc.* /Eclipse Foundation/ <http://www.eclipse.org/>/: The Platform for Open Innovation and Collaboration/ Twitter: @droy_eclipse
_______________________________________________ cross-project-issues-dev mailing list cross-project-issues-dev@eclipse.org To unsubscribe from this list, visit https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev