On Sat, May 15, 2010 at 12:53:30PM +0200, Christoph Anton Mitterer wrote: > On Fri, 2010-05-14 at 22:22 -0700, Russ Allbery wrote: > > These are really odd complaints to bring against Debian given that these > > are not Debian issues. Firefox, for example, works exactly the same way > > everywhere. What do you want Debian to do, write our own web browser? > > There are limits to what a distribution can do. > Again, these are just example where things could be secured.... > I do of course not want to Debian write it's own browser, but we already > patch some of them "quite heavily", don't we? > E.g. firefox to support all the plugin-packages stuff?
So your argument is, that it must be insecure because other things are insecure? > > For example, here, you don't appear to understand that we're talking about > > the user umask, which should not be affecting system services, > "should not"... well... I guess this isn't a proof, is it? You claimed that it would, so it is up to you to prove you're right, not the others to prove you're wrong. > We've had so many examples of things that happened although they should > not. > udisks should have probably not exported the dm-crypt keys to normal > users, but it did. > Many scripts (don't remember a concrete example now) should have > probably set a secure PATH, but they forgot to do so, and were > attackable. > sudo should have probably been secure, but it wasn't.... and if we would > have added normal users to sudoers (like Ubuntu does as far as I know), > "everything" would have been vulnerable. > The openssl issue should have probably just solved some valgrind errors > (wasn't that the idea of those patches?) but it lead probably to the > great disaster in cryptography in the last years... Again, a random list of problems that have no correlation whatsoever with UPG and umask. > > If regular users can add other people to groups on your system, you have > > way more serious security problems than user-private groups, and those > > security problems are not created by Debian. > Of course I talk about having this done by root. > It seems you do not have experience with systems with several thousands > of users, do you? > If I'm e.g. a root user at my university, or an empowered registration > authority for CERN,... I really cannot check whether what my users ask > is sane. > If user B says, please add user A to my group... I'll do it as long as > no system user/group is involved. So your argument against something that is secure by default is that you could make it insecure by doing a really brain-damaged thing? Of course having a umask of 022 doesn't really prevent you from doing stupid things, so I don't see how it would improve security in this specific instance. > Not to talk about the fact what happens, if at one day one wants to move > away from UPGs... Right, lets not talk about that, because it is completely irrelevant for the current discussion. > > And here, you appear to have completely misunderstood the purpose of > > user-private groups in exactly the way that I tried to explain earlier. > > If there is anyone in a user-private group other than the user > > corresponding to it, you have broken user-private groups and created a > > security hole on your system. > Yes I know... (the concept of them is really not so difficult to > understand, is it?) > > > But that's your misconfiguration, not > > something Debian did. > Honestly,... real world is different... see my example above in big > organisations, consider the fact that users have typically no idea what > they doing... That's why they don't have the rights to change their group. If root has so little idea of what he's doing that he adds other users to a UPG, then quite honestly he should consider the possibility that he has chosen the wrong line of work. > And even if you don't consider... > What we had now, was already kind of semi-UPGs wasn't it? > - Everybody had his private group, which others could be added to. No. You never add others to a UPG. So the following points are moot. > - But if others were added, they did not automatically have rwx-rights > on basically everything. > > With a default of 022: > The owner of the file has to manually decide to make a file writeable by > the members of his UPG, right? > Isn't that much secure as the other way round? > > With a default of 077: > It'd be even better, as the owner does not only have to deliberately > decide for write, but also for read rights. > > > > and every distribution picks something and leaves that to site policy, > > rightfully. 022 is the "standard" default choice, and I think it's more > > appropriate for a free software distribution, although I know that by > > itself is a moderately controversial statement. > IMHO, we generally should not do something, because any other distro is > doing it. No, but we can learn from others' experiences. Do you know of any specific security problems in distributions that have UPG + umask 002? > We should simply do the right. > So let me make clear, that I don't decline 002 because of "other > distributions have 022",... I decline it because I consider it to be > inherently insecure. I don't. I currently see no problem with umask 002 in combination with UPG. Your arguments boil down to two things: - it must be insecure because completely unrelated other things are - it can be made insecure by root doing a really stupid thing. harry -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20100515125250.ga23...@sbs288.lan