Permissions on /root/

2003-03-08 Thread Birzan George Cristian
Hello,

First of all, I'd like to say that, yes, I know this was discussed
before, but no consensus was reached and the thread died. (Or at least,
the one I found by doing a quick Google search)
Back to the issue at hand, the default permissions on /root/, which, at
the moment, are 755. IMHO, this is a possible security problem and it
should be set to, at least, 750 (thus allowing users in the wheel group
to access it). The reason behind this is simple, root is the system
administrator account, it should not be used for anything but that.
So, everything in /root/ is related, strictly to the task of
administering the machine, thus, off limits for the average luser. A
comparison between said average lusers' home dirs and /root/ isn't
appropriate since, again, you should only use root for administration
tasks and not for sharing files and what not, which is what (or at
least, the way I understand it) why the normal users' home dirs are 755.
Furthermore, I do believe the principle of least astonishment applies
here. I expect root's files, in root's home, to be readable _only_ by
root.
Arguments against 750? A sysadmin should know what he's doing and chmod
sensitive files so that nobody can read them. As a side note, while
discussing this, somebody asked what's stopping you from doing a 'chmod
750 /root/'. I think the answer is that Debian shouldn't be broken, by
default and rely on the system administrator to fix it.
That being said, should I file a bug against base-files?

P.S. Please preserve the CC: on the replies sent to the list. Thank you.

-- 
Regards,
Birzan George Cristian


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread bda
On Sat, Mar 08, 2003 at 01:02:13PM +0200, Birzan George Cristian wrote:
 Back to the issue at hand, the default permissions on /root/, which, at
 the moment, are 755. IMHO, this is a possible security problem and it
 should be set to, at least, 750 (thus allowing users in the wheel group

There is no `wheel` group in a default Debian install. You're thinking
BSD.

That being said, Darwin (OS X is the only BSD I have access to at the
moment) does lock down /var/root to 750 root:wheel. I presume that
FreeBSD (at least 4.0) does as well.

 comparison between said average lusers' home dirs and /root/ isn't
 appropriate since, again, you should only use root for administration

The FHS itself does not describe root's homedir as being anything but
another home directory [1].

[1] http://www.pathname.com/fhs/2.2/fhs-3.13.html

It does recommend, however, that the account ONLY be used for systems
administration purposes, which implies that /root falls under the
purview of Systemspace. 

 least, the way I understand it) why the normal users' home dirs are 755.
 Furthermore, I do believe the principle of least astonishment applies
 here. I expect root's files, in root's home, to be readable _only_ by
 root.

As a slight aside: As the FHS states, it's preferable to have all system
mail and whatnot going to the appropriate, unpriv'd, user, rather than
into a root mailbox.

Personally, I 700 /root because putting people in the root group is
wrong. That's what sudo is for, after all. (This being a Linux distro,
and not possessing the concept of wheel.) Muddying the distinction
between Systemspace and Userspace only serves to make the system as a
whole less secure and more of a pain in the butt to admin.

 750 /root/'. I think the answer is that Debian shouldn't be broken, by
 default and rely on the system administrator to fix it.

We (or rather the maintainers/developers) would first need to agree that
/root is something Special and not just another homedir.

I would personally agree with that assertation. 

It should be locked down and not touched by adduser (Would You Like To
Make All Homedirs World-Readable?).
-- 
bda
Cyberpunk is dead.  Long live cyberpunk.
http://mirrorshades.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 07:37:53AM -0500, bda wrote:
 It should be locked down and not touched by adduser (Would You Like To
 Make All Homedirs World-Readable?).

Actually I'd rather not, but there are (or at least
were, I've not checked in a long while) problems
with apache access to /home/user/public_html if
there was not global rx access to the whole directroy
path string.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread bda
On Sat, Mar 08, 2003 at 01:44:24PM +, Dale Amon wrote:
 On Sat, Mar 08, 2003 at 07:37:53AM -0500, bda wrote:
  It should be locked down and not touched by adduser (Would You Like To
  Make All Homedirs World-Readable?).
 
 Actually I'd rather not, but there are (or at least
 were, I've not checked in a long while) problems
 with apache access to /home/user/public_html if
 there was not global rx access to the whole directroy
 path string.

Sorry, I was referring only to /root, not normal user homedirs.

Unless you're thinking of http://foo.bar/~root/ for some sick reason.
;-)
-- 
bda
Cyberpunk is dead.  Long live cyberpunk.
http://mirrorshades.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



[no subject]

2003-03-08 Thread Brett Carrington
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
subscribe
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (Darwin)
iD8DBQE+agytmCMDkFhFYMcRAu/rAJ0WB3HhiLR9g6d6NdAG4cjQJ/c8zwCeMMtu
syVIs5rKrSBtaoLB0k8PQUA=
=hcxo
-END PGP SIGNATURE-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
Sigh. I specifically said use the original CC: and reply to the list, not
reply to the list and CC:.

On Sat, Mar 08, 2003 at 07:37:53AM -0500, bda wrote:
 On Sat, Mar 08, 2003 at 01:02:13PM +0200, Birzan George Cristian wrote:
  Back to the issue at hand, the default permissions on /root/, which, at
  the moment, are 755. IMHO, this is a possible security problem and it
  should be set to, at least, 750 (thus allowing users in the wheel group
 
 There is no `wheel` group in a default Debian install. You're thinking
 BSD.
 
 That being said, Darwin (OS X is the only BSD I have access to at the
 moment) does lock down /var/root to 750 root:wheel. I presume that
 FreeBSD (at least 4.0) does as well.

Sorry, I meant the root group, which is used as the wheel group. Can't
vouch for other nices since I never used any of them extensively. 

  comparison between said average lusers' home dirs and /root/ isn't
  appropriate since, again, you should only use root for administration
 
 The FHS itself does not describe root's homedir as being anything but
 another home directory [1].
 
 [1] http://www.pathname.com/fhs/2.2/fhs-3.13.html
 
 It does recommend, however, that the account ONLY be used for systems
 administration purposes, which implies that /root falls under the
 purview of Systemspace. 
 
  least, the way I understand it) why the normal users' home dirs are 755.
  Furthermore, I do believe the principle of least astonishment applies
  here. I expect root's files, in root's home, to be readable _only_ by
  root.
 
 As a slight aside: As the FHS states, it's preferable to have all system
 mail and whatnot going to the appropriate, unpriv'd, user, rather than
 into a root mailbox.
 
 Personally, I 700 /root because putting people in the root group is
 wrong. That's what sudo is for, after all. (This being a Linux distro,
 and not possessing the concept of wheel.) Muddying the distinction
 between Systemspace and Userspace only serves to make the system as a
 whole less secure and more of a pain in the butt to admin.

Read above, wheel is implemented, via PAM. What are these Systemspace
and Userspace you're talking about?

  750 /root/'. I think the answer is that Debian shouldn't be broken, by
  default and rely on the system administrator to fix it.
 
 We (or rather the maintainers/developers) would first need to agree that
 /root is something Special and not just another homedir.
 
 I would personally agree with that assertation. 
 
 It should be locked down and not touched by adduser (Would You Like To
 Make All Homedirs World-Readable?).
root is not the regular user. Users need o+x on their home dirs for
Apache to be able to serve pages.

-- 
Regards,
Birzan George Cristian


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
Please configure your mail client to a) wrap at 80 columns and b) set
In-Reply-To:

On Sat, Mar 08, 2003 at 04:13:43PM +0100, I.R. van Dongen wrote:
 
 Personally, I don't beleave /root should be used for any information that
 is 'dangerous' I personally use it sometimes for temp storage for .debs
 and such, before I move them to /usr/src.
 
 Therefor I don't really care what the default permissions are for /root.
 
 the files that need to be there (for example .my.cfg) need to have
 permission 600 or 700.

The fact that it shouldn't be used for storing any dangerous information
doesn't mean it's not being used for that. What I am asking, in case my
original mail wasn't clear enough, is why _shouldn't_ it be 750 or 700
by default?

-- 
Regards,
Birzan George Cristian


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Craig Dickson
Birzan George Cristian wrote:

 First of all, I'd like to say that, yes, I know this was discussed
 before, but no consensus was reached and the thread died. (Or at least,
 the one I found by doing a quick Google search)

No consensus was reached because none was possible.

 Back to the issue at hand, the default permissions on /root/, which, at
 the moment, are 755. IMHO, this is a possible security problem and it
 should be set to, at least, 750 (thus allowing users in the wheel group
 to access it). The reason behind this is simple, root is the system
 administrator account, it should not be used for anything but that.
 So, everything in /root/ is related, strictly to the task of
 administering the machine, thus, off limits for the average luser.

But in the course of doing things that you have to do as root, when do
you need to create files in /root? Almost never. If you find that you
are using /root frequently, then I would guess that you are doing things
as root that need not be done as root. For example, someone else in this
thread says he uses /root as temporary storage for .debs, which
suggests that he is running as root when he manually downloads .debs
from non-apt-gettable sources. I would argue that he should download the
files in his ordinary user account, then use root only to install them.
In which case, obviously the files can't be in /root, because the
ordinary user account can't put them there.

 A comparison between said average lusers' home dirs and /root/ isn't
 appropriate since, again, you should only use root for administration
 tasks and not for sharing files and what not, which is what (or at
 least, the way I understand it) why the normal users' home dirs are 755.

A comparison between /home/* and /root fails because root shouldn't
really be using his home directory for much of anything.

 Furthermore, I do believe the principle of least astonishment applies
 here. I expect root's files, in root's home, to be readable _only_ by
 root.

Your opinion. The issue matters so little that I find neither 700 nor
755 surprising.

If Debian were already setting /root to 700, that would be fine with me.
But 755 is also fine. I have no particular objections to either setting.
What I am responding to here is the attitude that there's something
wrong with 755, and the insistence that it be changed.

 Arguments against 750? A sysadmin should know what he's doing and chmod
 sensitive files so that nobody can read them. As a side note, while
 discussing this, somebody asked what's stopping you from doing a 'chmod
 750 /root/'. I think the answer is that Debian shouldn't be broken, by
 default and rely on the system administrator to fix it.

It isn't broken, so that argument fails.

 That being said, should I file a bug against base-files?

No. It'll probably just get rejected anyway.

Craig


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Craig Dickson
Birzan George Cristian wrote:

 The fact that it shouldn't be used for storing any dangerous information
 doesn't mean it's not being used for that.

If it shouldn't be used so, but it is being used so on a particular
machine, then that machine's admin is at fault.

 What I am asking, in case my original mail wasn't clear enough, is why
 _shouldn't_ it be 750 or 700 by default?

No, at this point, the question is, why should it be changed? We have an
established default of 755. You're asking for a change, but you have no
convincing argument supporting the change. Therefore, no change.

Craig


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger
At 13:02 Uhr +0200 08.03.2003, Birzan George Cristian wrote:
the moment, are 755. IMHO, this is a possible security problem
- Why is this a possible security problem? It looks like you are 
not aware that you should always and anyways (regardless of whether 
you're root at the moment or not) take care to make sensitive files 
not world readable. If you don't have this habit then maybe you'll 
end up making sensitive files world readable in your non-root account.

- Sensitive items (like user related config files and dirs, for 
example /root/.ssh/) are 0700 regardless of user, anyways, so there's 
no need to add another protection.

- You should also be aware that a 0700 directory does not protect you 
if you are moving another directory from outside to inside, since 
users who have already chdir'd into it remain inside it. (Example:
  root:anybody:
chmod 0700 /root
# root feels safe
mkdir /blah
 chdir /blah
mv /blah /root
# root thinks ok now blah is safe
cd /root/blah
cat  info
(enter sensitive info, Ctl-D)
 cat info
 (looks at info)

- The problem with a 0700 /root is that it does not leave it a *joice* anymore.

- In fact I am using /root/bin/, /root/etc/, /root/sbin/, 
/root/libexec/ for scripts which I have written myself but should be 
for any user on the system. My /etc/skel/.bash_profile includes 
/root/bin into the user's paths.
  Why do I not use /usr/local/{bin,sbin,lib} and /etc for that?
  * I don't want my stuff to be mixed with software from other people.
  * I want to be able to easily tar my stuff up to transfer it to 
another machine.
  * Sometimes I override an existing binary living in /usr/local/bin. 
Since /root/bin is earlier in my path that's possible.

  Maybe you can tell me which other directory is better suited for 
that than /root?

I vote for leaving the permissions on /root as they are.

Christian.

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
On Sat, Mar 08, 2003 at 08:05:26AM -0800, Craig Dickson wrote:
 But in the course of doing things that you have to do as root, when do
 you need to create files in /root? Almost never. If you find that you
 are using /root frequently, then I would guess that you are doing things
 as root that need not be done as root. For example, someone else in this
 thread says he uses /root as temporary storage for .debs, which
 suggests that he is running as root when he manually downloads .debs
 from non-apt-gettable sources. I would argue that he should download the
 files in his ordinary user account, then use root only to install them.
 In which case, obviously the files can't be in /root, because the
 ordinary user account can't put them there.

Yes, you don't need to have many files in there, but, IMHO, you
shouldn't have to worry about users being able to look into what should
be root's files. Even config files for some programs are world readable,
by default.
The first example that comes to mind, where you would want to have files
in /root/, is when you have a script of some sort, or even a program,
which should only be accessible by root. (~/bin/ is FHS compliant? I
know I use it...)

 Your opinion. The issue matters so little that I find neither 700 nor
 755 surprising.

I've talked with several other friends, and most of them (5 to 1),
agreed that /root/ shouldn't be 755, but something more restrictive.

 If Debian were already setting /root to 700, that would be fine with me.
 But 755 is also fine. I have no particular objections to either setting.
 What I am responding to here is the attitude that there's something
 wrong with 755, and the insistence that it be changed.

Think from the perspective of the not-so-clued admin which install
Debian and, even though it's mostly his fault, puts Lord knows what file
in there. Shouldn't we try to prevent that? And, not only that, but you
must remember that we are, after all, human. You may forget you didn't
set the permissions, for example, if you deal with many systems.
Shouldn't Debina try to prevent this? If the user needs/wants /root/ to
be 755, he/she can do it as it'll be obvious why it's not working, as
opposed to waiting for somebody to poke around your /root/ to find that
out.
That being said, I want to add that I'm not insisting on getting it
changed, I'm just asking if there's something wrong with 750/700 that
would cause it to not be the default. (I also find out if I've been
doing something wrong for some time by chmodding /root/ to that. :-))

 It isn't broken, so that argument fails.

There are other not broken things that are being fixed, for convenience.
There's one I remember offhand, the NMU against sysklogd for 'fixing'
something that's easily configurable by the admin (The priority of
messages that go to console).

 No. It'll probably just get rejected anyway.

I won't submit if there's a strong opposition against my idea. Even if I
do, it's not mere mortals like me who decide these kinds of things so
it's a moot point.

-- 
Regards,
Birzan George Cristian


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 07:12:13PM +0200, Birzan George Cristian wrote:
 I've talked with several other friends, and most of them (5 to 1),
 agreed that /root/ shouldn't be 755, but something more restrictive.

I'm in agreement as well. I use /root as a common
communication area among admin staff. Admin staff
have their own home directories but prefer them keep
them private. /root is a good place to put things
which are intended to be public to the admin
group. sudo is fine for doing many things, but not
everything.

I use cfengine2 to force it at least to 750. I also
use cfengine2 to enforce all sorts of harsher
preferences so that I automatically override
some of the weaker debian settings within minutes
of doing an apt-get or dselect upgrade.

When you have multiple people, working over long
periods of time (years), with varying stress
conditions, there will at some point be mistakes
made. That's why defense in depth is so important. 
The more layers of protection you can place the
more likely a single mistake won't leave you
wide open.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger
At 19:23 Uhr +0200 08.03.2003, Birzan George Cristian wrote:
On Sat, Mar 08, 2003 at 05:40:31PM +0100, Christian Jaeger wrote:
 - You should also be aware that a 0700 directory does not protect you
 if you are moving another directory from outside to inside, since
 users who have already chdir'd into it remain inside it.
Yes, but how often does that happen?
Maybe not often, but an attacker could run a daemon that opendir()s 
each newly created directory just in the hope that one of them 
happens to be moved into your secret area. Call me paranoid:)  (And I 
still don't see a reason why it should be different for root than 
anyone else. The other user's secrets are probably just as important 
as root's.)

  - The problem with a 0700 /root is that it does not leave it a *joice*
 anymore.
Eh, you'll have to excuse me, but I have no idea what that phrase means.
I meant, if /root is world-readable, then you can still make a 
subdirectory which is not (i.e. I have a /root/tmp which is 0700). If 
/root is not world-readable, then it can never contain stuff to be 
used by other users.

Maybe you can tell me which other directory is better suited for
 that than /root?
Yes. Your regular account's home.
I don't because:
- I'm promoting my /root/{bin,...} solution for colleagues as well, 
and we share scripts in those directories. They would have to include 
the bin/ subdirectory of my home dir on the machines we share.
- the scripts under /root/* are owned by root. If OTOH I'm executing 
the $HOME/bin/ scripts of another user and his account is 
compromised, root would be as well.
- in my own non-root ~/bin/ are scripts that are really specific to 
me, noone else. (And sometimes I start writing new scripts there, 
until they are ready for everyone to be used, at which point I'm 
moving and chown'ing them to root.)

Christian

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: [work] Integrity (of Debian packages)

2003-03-08 Thread Jord Swart (C)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Saturday 08 March 2003 04:11, Pav wrote:

Let me have a moment of silence for your excellent reply.

Thank you, it gives me some hope again.

Jord

- -- 

Technical Consultant ECM

mailto: [EMAIL PROTECTED]

Key Fingerprint: 1856 A04C FB51 9D2D 09B2 58A5 96F6 37E0 1CF6 CCD0
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE+ajnGlvY34Bz2zNARAmoTAJwPFYnY4sMuspUceA+zg3Ikp+qbfACdHJWw
p7E2s9N1MCssLQ/Z48sxhzA=
=zISU
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Ted Parvu
On Sat, Mar 08, 2003 at 06:09:08PM +0200, Birzan George Cristian wrote:
 
 The fact that it shouldn't be used for storing any dangerous information
 doesn't mean it's not being used for that. What I am asking, in case my
 original mail wasn't clear enough, is why _shouldn't_ it be 750 or 700
 by default?

Why would you want this changed but be ok with, unless I changed mine
somewhere and forgot, a default root umask of 0022 ?

just curious,

Ted

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
   WAR IS PEACE
FREEDOM IS SLAVERY
  IGNORANCE IS STRENGTH  


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
On Sat, Mar 08, 2003 at 07:19:44PM +0100, Christian Jaeger wrote:
 Call me paranoid:) 

Yes, but if you're so paranoid, why not add another layer of protection,
by making /root/ 700?

 I meant, if /root is world-readable, then you can still make a 
 subdirectory which is not (i.e. I have a /root/tmp which is 0700). If 
 /root is not world-readable, then it can never contain stuff to be 
 used by other users.
 
This would be the default setup, not the mandatory one. Administrators
could change it to whatever they want. As I said in a previous email,
the fact that it doesn't work is going to work is pretty obvious, as
opposed to noticing that because you were sloppy once, somebody read
something they shouldn't have.

 I don't because:
 - I'm promoting my /root/{bin,...} solution for colleagues as well, 
 and we share scripts in those directories. They would have to include 
 the bin/ subdirectory of my home dir on the machines we share.
 - the scripts under /root/* are owned by root. If OTOH I'm executing 
 the $HOME/bin/ scripts of another user and his account is 
 compromised, root would be as well.
 - in my own non-root ~/bin/ are scripts that are really specific to 
 me, noone else. (And sometimes I start writing new scripts there, 
 until they are ready for everyone to be used, at which point I'm 
 moving and chown'ing them to root.)

Okay, bad example. Maybe /opt/{bin,...}? Or even /opt/mystuff/{bin,...},
if you still want to be able to tar them up easily. (arguably, this
would be easily accomplished by an alias, tarstuff will tar up
/opt/{bin,...})

The least that could be done wold be to _ask_ the user which he prefers.
As I said, there are people who aren't aware of this. Others may, as I
said, get sloppy, being used to, say, RedHat, which has it 750. I'm not
saying they're not to blame, I'm just saying they should be educated.

And if all else fails, all other things being equal, I think we should
look at which of the two scenarios is more likely to occur. How many
administrators actually use the directory structure you suggested?
(which, imho, is not FHS compliant, so it can't really constitute an
argument in 755's favour...)

-- 
Regards,
Birzan George Cristian


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger
At 17:47 Uhr + 08.03.2003, Dale Amon wrote:
When you have multiple people, working over long
periods of time (years), with varying stress
conditions, there will at some point be mistakes
made. That's why defense in depth is so important.
The more layers of protection you can place the
more likely a single mistake won't leave you
wide open.
Isn't it the same as for any user account? If that user (who maybe 
shares his account with other people) wants his home dir private, he 
can do so. Or create a subdir which is private(*). I just see no 
reason to make a difference between root and other users.  I've 
started using my /root/bin/ -for-users approach since I've relied on 
that fact of world-readable home dirs. (Unix is socially friendly 
was a phrase in connection with permissions that I read somewhere 
when I began working with (unix/)linux.)  And as written in my other 
reply I'm still missing a better alternative to /root/bin. 
/local-admin's-software/bin maybe? AFAIK, the FHS does not provide 
any.

(*) well of course this won't help for files that have to be directly 
in root's home, like shell startup files (anybody ever made such a 
file world-writable?). But well. BTW on the solaris machine I've 
worked some time, root's home was /, and I'm sure that was not 0700.

Christian (who is going to close this thread in his mind now :-).

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Permissions on /root/

2003-03-08 Thread Thomas Sjögren
On Sat, 8 Mar 2003, Birzan George Cristian wrote:

  It should be locked down and not touched by adduser (Would You Like To
  Make All Homedirs World-Readable?).
 root is not the regular user. Users need o+x on their home dirs for
 Apache to be able to serve pages.

No they don't.
You shouldn't place user websites in their home dirs. Place the user
webspace in e.g  /var/www/[user] and symlink from public_html or
whatever.

/Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
On Sat, Mar 08, 2003 at 10:58:10AM -0800, Ted Parvu wrote:
 Why would you want this changed but be ok with, unless I changed mine
 somewhere and forgot, a default root umask of 0022 ?

Because I haven't, yet, seen a box that came, by default, with a
different umask. Again, for me it's about the principle of least
astonishment...

-- 
Regards,
Birzan George Cristian


pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Stefan Neufeind
On 8 Mar 2003 at 17:40, Christian Jaeger wrote:

 At 13:02 Uhr +0200 08.03.2003, Birzan George Cristian wrote:
 - You should also be aware that a 0700 directory does not protect you
 if you are moving another directory from outside to inside, since
 users who have already chdir'd into it remain inside it. (Example:
root:anybody:
  chmod 0700 /root
  # root feels safe
  mkdir /blah
   chdir /blah
  mv /blah /root
  # root thinks ok now blah is safe
  cd /root/blah
  cat  info
  (enter sensitive info, Ctl-D)
   cat info
   (looks at info)

why is he allowed to use mv /blah /root? /root is write-protected 
so why could he move blah inside of it?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Debian-lists
Hi list,

 Birzan George Cristian wrote:
 
  First of all, I'd like to say that, yes, I know this was discussed
  before, but no consensus was reached and the thread died. (Or at least,
  the one I found by doing a quick Google search)
 
 No consensus was reached because none was possible.

how about offering it as an installation option?
* /root/ permission
some say 755 because ...
others
700 because ...
please select [700 | 750 | 755]

or whatever options seem sensible...

Cheers, joost.

-
Support open source software like
 - Linux (Debian is a nice example)
 - Apache
 - PHP
 - MySQL
 - Horde
and many others...


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Craig Dickson
[EMAIL PROTECTED] wrote:

 how about offering it as an installation option?
 * /root/ permission
 some say 755 because ...
 others
 700 because ...
 please select [700 | 750 | 755]
 
 or whatever options seem sensible...

Because it's unnecessary. Installation is already too cluttered with
various choices the user has to make, most of which are more important
than this one.

It doesn't matter much whether /root is 755, 750, or 700. The sensible
thing to do is just choose one and stick with it. The user can change it
after installation if they like. Right now Debian either uses 755 or
sets /root to be the same as /home/*; I'm not sure which. If you want
that to change, you need a better argument than anything that has been
presented so far.

Craig



pgp0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 08:07:51PM +0100, Christian Jaeger wrote:
 Isn't it the same as for any user account? If that user (who maybe 
 shares his account with other people) wants his home dir private, he 
 can do so. Or create a subdir which is private(*). I just see no 

Typical user accounts are not the same as the root 
user unless you go to selinux where you have to 
assume the admin role to actually do anything. Since
I'm not running selinux on any production servers (yet)
I prefer to put as severe a wall as I can between luser
and root as I possibly can.

The friendliness of privs depends very much on what
it is you are doing. If the machine happens to be
a firewall protecting a LAN with proprietary data,
or a web server with many large web sites, the
criteria are rather different.

As I said, I use /root more as the common home for
the admin group. Not necessarily security important 
things there all the time, but sometimes transiently 
there is.

Security means turn everything off until the machine
is totally unusable, and then turn them back on until
you've got precisely what is required for the purpose
and no more.

Life will get easier when selinux goes more main 
stream as these things will be easily handled via
policy rather than file owner/mode settings.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 08:16:38PM +0100, Thomas Sj?gren wrote:
  root is not the regular user. Users need o+x on their home dirs for
  Apache to be able to serve pages.
 
 No they don't.
 You shouldn't place user websites in their home dirs. Place the user
 webspace in e.g  /var/www/[user] and symlink from public_html or
 whatever.

I sometimes do, however it complicated the back up of
individuals. With rsync these days, the user backup 
problem on a rack of machines is pretty moot, so 
I'll give you that.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger
At 20:23 Uhr +0100 08.03.2003, Stefan Neufeind wrote:
On 8 Mar 2003 at 17:40, Christian Jaeger wrote:

 At 13:02 Uhr +0200 08.03.2003, Birzan George Cristian wrote:
 - You should also be aware that a 0700 directory does not protect you
 if you are moving another directory from outside to inside, since
 users who have already chdir'd into it remain inside it. (Example:
 root:   anybody:
 -   -
   chmod 0700 /root
  # root feels safe
  mkdir /blah
 chdir /blah
  mv /blah /root
  # root thinks ok now blah is safe
  cd /root/blah
  cat  info
  (enters sensitive info, Ctl-D)
  cat info
  (looks at info)
why is he allowed to use mv /blah /root? /root is write-protected
so why could he move blah inside of it?
It is *root* who is moving the dir. (Left side. I've increased the 
space a bit.) And he (is root masculine?) is moving anybody right 
into the secret area at the same time.

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


unsubscribe

2003-03-08 Thread Helmut Martin



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes:

 I began working with (unix/)linux.)  And as written in my other reply
 I'm still missing a better alternative to
 /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does
 not provide any.

Maybe /usr/local/sbin is, what you're looking for?

Regards, Olaf.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [work] Integrity of Debian packages

2003-03-08 Thread Andreas Kotes
Hi!

this is off topic, but in case you've been wondering, too:

* Joost Beintema [EMAIL PROTECTED] [20030308 04:47]:
  Your comment seems to lay blame for 9/11 on the intelligence community. 
  It's fair to say that they had major flaws at that time (and possibly 
  now as well). You could argue that this specific incident could have 
  been prevented if certain measures were in place. Keep in mind, the 
  perpetrators were a determined group that was willing to accept death in 
  the pursuit of their goal. That's a combination that is nearly unstoppable.
 
 All I hear is a war-yelling Bush but I haven' heared any good story (from
 politicians) about the WHY of attacks.

economic reasons:

- the oil price influences a HUGE part of the economy, having to pay the
  market price for iraq oil doesn't work
- the bush family is a not-so-small player in weapons industry as well
  as oil industry
- deficit/military/government spending is good for the economy (any
  economist can tell you that) .. the formula:

  GDP = C+G+I+X-Im
  (where:
  GDP == Gross Domestic Product
  C   == Consumption
  G   == Government spending
  I   == Investments
  X   == Exports
  Im  == Imports)

  .. this very formular also explains tax cuts, the deficit, the hype
  against foreign products / Imports, etc.
- military spending:
  Irak:~ 20.0% of GDP
  USA: ~  5.5% of GDP (!)
  Germany: ~  3.5% of GDP
  .. reasoning goes that a raise of spending for weapons beyond a
  general percentage is a precursor for war - as it has always been

  the actual values don't seem to matter much - the fact that the US
  just have a _huge_ GDP does count a lot .. $400 _billion_ military
  expenses a year are 'only' 5.5% .. the ~$26 billion offered to turkey
  are interesting, too. far more interesting are the ~$15 _million_ for
  post-war refugee help (UNHCR). 

  another question: how could iraq to something decent using its money,
  considering the sanctions and the interweavement of countries these
  times?
- old ammunition and weapon technologies have to be -uh- put out of
  service

political reasons:

- gaining access to he iraq oil fields would lessen the influence of
  OPEC, thus the oil price
- solving the palaestina/israel conflict would compromise israel
- disrupting europe unity means keeping relative strength

pyschological reasons:

- giving in to europe would mean losing face
- admiting one was wrong would mean losing face
- searching problems everywhere else but at home is far easier than
  facing reality
- powerlessness (e.g. regarding 9/11) of oneself usually results in
  applying power to others

.. just guessing. I'm pretty sure there are more in each category.

   Count

-- 
Andreas Kotes - ICQ: 3741366 - The views expressed herein are (only) mine.
Unser Leben ist das, wozu unser Denken es macht. -- OpenPGP key 0x8F94C228
Our Life is what our thinking makes it.. Your mind is a weapon! Arm it ..


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [VERY Offtopic] Politics (was Debian Package Integrity)

2003-03-08 Thread David Ehle
control over members of his Branch Davidian followers, as Saddam Hussein
does over the Iraqis. The parallel does not stop there.

Law enforcement authorities were certain Koresh had accumulated a
formidable arsenal of weapons and ammunition at his compound and may have
been planning on using them someday. The FBI also had evidence that he was
sexually abusing young girls in the cult. After the first law enforcement
assault failed, after losing the element of surprise, the Branch Davidian
compound was contained and steadily increasing pressure was applied for
weeks. But then the FBI decided it could wait no longer and mounted the
second assault with disastrous consequences. The children we sought to
liberate all died when Koresh and his followers set fires leading to their
mass death and destruction.

The FBI, of course, cannot be blamed for what Koresh set in motion.
Nevertheless, we learned some lessons from this unfortunate episode and
quickly explored better ways to deal with such challenges. As a direct
result of that exploration, many subsequent criminal/terrorist standoffs
in which the FBI has been involved have been resolved peacefully and
effectively. I would suggest that present circumstances vis-a-vis Iraq are
very analagous, and that you consider sharing with senior administration
officials the important lessons learned by the FBI at Waco.

You are only too well aware that fighting the war on terrorism and crime
is an unbelievably difficult mission that will only become more difficult
in the years to come, adversely affecting future generations of Americans.
The extraneous pressures currently being brought to bear by politicians of
both parties upon the FBI and other U.S. intelligence agencies, however,
only worsen the present situation.

I know that my comments appear so presumptuous for a person of my rank in
the organization and I'm very sorry for that impression. A word of
explanation is therefore probably in order as to why I feel moved to write
you directly about these issues. A good part of the reason lies in a
promise I made to myself after I realized the enormity of what resulted
when FBI Headquarters Supervisory personnel dismissed the warnings of
Minneapolis agents pre-September 11, 2001. I was well aware of the
forceful but frustrated efforts being made by Minneapolis case agents and
their supervisor in their efforts to get Headquarters to move. But since
my own role was peripheral, I did not think I could be of much additional
help. Since that fateful day of September 11, 2001, however, I have not
ceased to regret that perhaps I did not do all that I might have done.

I promised myself that in the future I would always try.

I appreciate that you alone do not determine policy on the terrorist
threat from inside or outside the country, that, indeed, you may have
little influence in the crafting of broad domestic or foreign policy. And
it seems clear to me now that the decision to attack Iraq was taken some
time ago and you, even as FBI Director, may be little more than a helpless
bystander.

Such an attack, though, may have grave consequences for your ability to
discharge your responsibility to protect Americans, and it is altogether
likely that you will find yourself a helpless bystander to a rash of
9-11s. The bottom line is this: We should be deluding neither ourselves
nor the American people that there is any way the FBI, despite the various
improvements you are implementing, will be able to stem the flood of
terrorism that will likely head our way in the wake of an attack on Iraq.
What troubles me most is that I have no assurance that you have made that
clear to the president.

If you believe my concerns have merit, I would ask you to share them with
the president and attorney general. We no doubt can agree that our
Government has a gargantuan task facing it of melding American foreign
policy to make the world, and primarily United States soil, a safer place.
I pray for our American and allied world leaders^Ò success in achieving
this most important objective.

Thank you so much for allowing me to express these thoughts. They are
personal in nature and should not be construed as representing the view of
any FBI unit or other agents.

Yours truly,

Coleen Rowley




On Sun, 9 Mar 2003, Andreas Kotes wrote:

 Hi!

 this is off topic, but in case you've been wondering, too:

 * Joost Beintema [EMAIL PROTECTED] [20030308 04:47]:
   Your comment seems to lay blame for 9/11 on the intelligence community.
   It's fair to say that they had major flaws at that time (and possibly
   now as well). You could argue that this specific incident could have
   been prevented if certain measures were in place. Keep in mind, the
   perpetrators were a determined group that was willing to accept death in
   the pursuit of their goal. That's a combination that is nearly unstoppable.
 
  All I hear is a war-yelling Bush but I haven' heared any good story (from
  politicians) about the WHY of attacks

Re: [VERY Offtopic] Politics (was Debian Package Integrity)

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 06:18:13PM -0600, David Ehle wrote:
 
 Ok I've resisted this thread for quite a while because its so off topic...
 but since nobody is complaining... I'm going to post a facinating letter
 from inside the FBI I ran across recently. I havn't done much work
 checking authenticity but even its bogus it makes some great points.

Please! I've read her thing before. It's real and has
been in the news. Some agree with her and some don't,
and it is very much on party lines. I read plenty
of this elsewhere, which is where this discussion 
should be taken. alt.conspiracy, I don't much care,
but not here.

If you want my opinions, you'll have read them
elsewhere:
http://www.samizdata.com/blog
where I am an editor. 

Now *please* get back to debian security.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger
At 23:29 Uhr +0100 08.03.2003, Olaf Dietsche wrote:
Christian Jaeger [EMAIL PROTECTED] writes:

  I began working with (unix/)linux.)  And as written in my other reply
  I'm still missing a better alternative to
  /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does
  not provide any.
Maybe /usr/local/sbin is, what you're looking for?
No, this is still a directory generally used for local tar.gz 
installs. And sbin is for admins, bin for users, right?.

(The suggestion to use /opt/* is ok. It's (as I've just realized) 
even what the FHS stipulates: the directories /opt/bin, /opt/doc, 
/opt/include, /opt/info, /opt/lib, and /opt/man are reserved for 
local system administrator use. Hmm, Debian does not create any of 
the /opt (and /opt/{bin,doc,include,info,lib,man}), /var/opt, and 
/etc/opt directories in it's standard installation, and does not even 
mention those in the policy (chapter 10.1). I'll maybe have to set up 
cfengine to create those.. ;-).)

Christian.

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes:

 At 23:29 Uhr +0100 08.03.2003, Olaf Dietsche wrote:
Christian Jaeger [EMAIL PROTECTED] writes:

   I began working with (unix/)linux.)  And as written in my other reply
   I'm still missing a better alternative to
   /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does
   not provide any.

Maybe /usr/local/sbin is, what you're looking for?

 No, this is still a directory generally used for local tar.gz
 installs. And sbin is for admins, bin for users, right?.

Yup, I misinterpreted, what you mean with /local-admin's-software/bin.

Regards, Olaf.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [VERY Offtopic] Politics (was Debian Package Integrity)

2003-03-08 Thread Dale Amon
On Sun, Mar 09, 2003 at 02:30:11AM +0100, Thomas Ritter wrote:
 Am Sonntag, 9. M?rz 2003 01:52 schrieb Dale Amon:
  http://www.samizdata.com/blog

Oops. http://www.samizdata.net/blog 


-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [VERY Offtopic] Politics (was Debian Package Integrity)

2003-03-08 Thread Jeff Elkins
On Saturday 08 March 2003 7:52 pm, Dale Amon wrote:
Now *please* get back to debian security.

Concur...wholeheartedly!

Jeff Elkins
http://www.elkins.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Permissions on /root/

2003-03-08 Thread Birzan George Cristian
Hello,

First of all, I'd like to say that, yes, I know this was discussed
before, but no consensus was reached and the thread died. (Or at least,
the one I found by doing a quick Google search)
Back to the issue at hand, the default permissions on /root/, which, at
the moment, are 755. IMHO, this is a possible security problem and it
should be set to, at least, 750 (thus allowing users in the wheel group
to access it). The reason behind this is simple, root is the system
administrator account, it should not be used for anything but that.
So, everything in /root/ is related, strictly to the task of
administering the machine, thus, off limits for the average luser. A
comparison between said average lusers' home dirs and /root/ isn't
appropriate since, again, you should only use root for administration
tasks and not for sharing files and what not, which is what (or at
least, the way I understand it) why the normal users' home dirs are 755.
Furthermore, I do believe the principle of least astonishment applies
here. I expect root's files, in root's home, to be readable _only_ by
root.
Arguments against 750? A sysadmin should know what he's doing and chmod
sensitive files so that nobody can read them. As a side note, while
discussing this, somebody asked what's stopping you from doing a 'chmod
750 /root/'. I think the answer is that Debian shouldn't be broken, by
default and rely on the system administrator to fix it.
That being said, should I file a bug against base-files?

P.S. Please preserve the CC: on the replies sent to the list. Thank you.

-- 
Regards,
Birzan George Cristian


pgpju4JezEChb.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread bda
On Sat, Mar 08, 2003 at 01:02:13PM +0200, Birzan George Cristian wrote:
 Back to the issue at hand, the default permissions on /root/, which, at
 the moment, are 755. IMHO, this is a possible security problem and it
 should be set to, at least, 750 (thus allowing users in the wheel group

There is no `wheel` group in a default Debian install. You're thinking
BSD.

That being said, Darwin (OS X is the only BSD I have access to at the
moment) does lock down /var/root to 750 root:wheel. I presume that
FreeBSD (at least 4.0) does as well.

 comparison between said average lusers' home dirs and /root/ isn't
 appropriate since, again, you should only use root for administration

The FHS itself does not describe root's homedir as being anything but
another home directory [1].

[1] http://www.pathname.com/fhs/2.2/fhs-3.13.html

It does recommend, however, that the account ONLY be used for systems
administration purposes, which implies that /root falls under the
purview of Systemspace. 

 least, the way I understand it) why the normal users' home dirs are 755.
 Furthermore, I do believe the principle of least astonishment applies
 here. I expect root's files, in root's home, to be readable _only_ by
 root.

As a slight aside: As the FHS states, it's preferable to have all system
mail and whatnot going to the appropriate, unpriv'd, user, rather than
into a root mailbox.

Personally, I 700 /root because putting people in the root group is
wrong. That's what sudo is for, after all. (This being a Linux distro,
and not possessing the concept of wheel.) Muddying the distinction
between Systemspace and Userspace only serves to make the system as a
whole less secure and more of a pain in the butt to admin.

 750 /root/'. I think the answer is that Debian shouldn't be broken, by
 default and rely on the system administrator to fix it.

We (or rather the maintainers/developers) would first need to agree that
/root is something Special and not just another homedir.

I would personally agree with that assertation. 

It should be locked down and not touched by adduser (Would You Like To
Make All Homedirs World-Readable?).
-- 
bda
Cyberpunk is dead.  Long live cyberpunk.
http://mirrorshades.org



Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 07:37:53AM -0500, bda wrote:
 It should be locked down and not touched by adduser (Would You Like To
 Make All Homedirs World-Readable?).

Actually I'd rather not, but there are (or at least
were, I've not checked in a long while) problems
with apache access to /home/user/public_html if
there was not global rx access to the whole directroy
path string.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--



Re: Permissions on /root/

2003-03-08 Thread bda
On Sat, Mar 08, 2003 at 01:44:24PM +, Dale Amon wrote:
 On Sat, Mar 08, 2003 at 07:37:53AM -0500, bda wrote:
  It should be locked down and not touched by adduser (Would You Like To
  Make All Homedirs World-Readable?).
 
 Actually I'd rather not, but there are (or at least
 were, I've not checked in a long while) problems
 with apache access to /home/user/public_html if
 there was not global rx access to the whole directroy
 path string.

Sorry, I was referring only to /root, not normal user homedirs.

Unless you're thinking of http://foo.bar/~root/ for some sick reason.
;-)
-- 
bda
Cyberpunk is dead.  Long live cyberpunk.
http://mirrorshades.org



Re: Re: Permissions on /root/

2003-03-08 Thread I.R. van Dongen

Personally, I don't beleave /root should be used for any information that is 
'dangerous' I personally use it sometimes for temp storage for .debs and such, 
before I move them to /usr/src.

Therefor I don't really care what the default permissions are for /root.

the files that need to be there (for example .my.cfg) need to have permission 
600 or 700.

Gr,

Ivo van Dongen


On Sat, 8 Mar 2003 09:34:37 -0500, [EMAIL PROTECTED] wrote:

 On Sat, Mar 08, 2003 at 01:44:24PM +, Dale Amon wrote:
  On Sat, Mar 08, 2003 at 07:37:53AM -0500, bda wrote:
   It should be locked down and not touched by adduser (Would You Like To
   Make All Homedirs World-Readable?).
  
  Actually I'd rather not, but there are (or at least
  were, I've not checked in a long while) problems
  with apache access to /home/user/public_html if
  there was not global rx access to the whole directroy
  path string.
 
 Sorry, I was referring only to /root, not normal user homedirs.
 
 Unless you're thinking of http://foo.bar/~root/ for some sick reason.
 ;-)
 -- 
 bda
 Cyberpunk is dead.  Long live cyberpunk.
 http://mirrorshades.org
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 
 




[no subject]

2003-03-08 Thread Brett Carrington

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

subscribe
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (Darwin)

iD8DBQE+agytmCMDkFhFYMcRAu/rAJ0WB3HhiLR9g6d6NdAG4cjQJ/c8zwCeMMtu
syVIs5rKrSBtaoLB0k8PQUA=
=hcxo
-END PGP SIGNATURE-



Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
Sigh. I specifically said use the original CC: and reply to the list, not
reply to the list and CC:.

On Sat, Mar 08, 2003 at 07:37:53AM -0500, bda wrote:
 On Sat, Mar 08, 2003 at 01:02:13PM +0200, Birzan George Cristian wrote:
  Back to the issue at hand, the default permissions on /root/, which, at
  the moment, are 755. IMHO, this is a possible security problem and it
  should be set to, at least, 750 (thus allowing users in the wheel group
 
 There is no `wheel` group in a default Debian install. You're thinking
 BSD.
 
 That being said, Darwin (OS X is the only BSD I have access to at the
 moment) does lock down /var/root to 750 root:wheel. I presume that
 FreeBSD (at least 4.0) does as well.

Sorry, I meant the root group, which is used as the wheel group. Can't
vouch for other nices since I never used any of them extensively. 

  comparison between said average lusers' home dirs and /root/ isn't
  appropriate since, again, you should only use root for administration
 
 The FHS itself does not describe root's homedir as being anything but
 another home directory [1].
 
 [1] http://www.pathname.com/fhs/2.2/fhs-3.13.html
 
 It does recommend, however, that the account ONLY be used for systems
 administration purposes, which implies that /root falls under the
 purview of Systemspace. 
 
  least, the way I understand it) why the normal users' home dirs are 755.
  Furthermore, I do believe the principle of least astonishment applies
  here. I expect root's files, in root's home, to be readable _only_ by
  root.
 
 As a slight aside: As the FHS states, it's preferable to have all system
 mail and whatnot going to the appropriate, unpriv'd, user, rather than
 into a root mailbox.
 
 Personally, I 700 /root because putting people in the root group is
 wrong. That's what sudo is for, after all. (This being a Linux distro,
 and not possessing the concept of wheel.) Muddying the distinction
 between Systemspace and Userspace only serves to make the system as a
 whole less secure and more of a pain in the butt to admin.

Read above, wheel is implemented, via PAM. What are these Systemspace
and Userspace you're talking about?

  750 /root/'. I think the answer is that Debian shouldn't be broken, by
  default and rely on the system administrator to fix it.
 
 We (or rather the maintainers/developers) would first need to agree that
 /root is something Special and not just another homedir.
 
 I would personally agree with that assertation. 
 
 It should be locked down and not touched by adduser (Would You Like To
 Make All Homedirs World-Readable?).
root is not the regular user. Users need o+x on their home dirs for
Apache to be able to serve pages.

-- 
Regards,
Birzan George Cristian


pgpc5imCpkvn0.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
Please configure your mail client to a) wrap at 80 columns and b) set
In-Reply-To:

On Sat, Mar 08, 2003 at 04:13:43PM +0100, I.R. van Dongen wrote:
 
 Personally, I don't beleave /root should be used for any information that
 is 'dangerous' I personally use it sometimes for temp storage for .debs
 and such, before I move them to /usr/src.
 
 Therefor I don't really care what the default permissions are for /root.
 
 the files that need to be there (for example .my.cfg) need to have
 permission 600 or 700.

The fact that it shouldn't be used for storing any dangerous information
doesn't mean it's not being used for that. What I am asking, in case my
original mail wasn't clear enough, is why _shouldn't_ it be 750 or 700
by default?

-- 
Regards,
Birzan George Cristian


pgpCb9a4naU56.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Craig Dickson
Birzan George Cristian wrote:

 First of all, I'd like to say that, yes, I know this was discussed
 before, but no consensus was reached and the thread died. (Or at least,
 the one I found by doing a quick Google search)

No consensus was reached because none was possible.

 Back to the issue at hand, the default permissions on /root/, which, at
 the moment, are 755. IMHO, this is a possible security problem and it
 should be set to, at least, 750 (thus allowing users in the wheel group
 to access it). The reason behind this is simple, root is the system
 administrator account, it should not be used for anything but that.
 So, everything in /root/ is related, strictly to the task of
 administering the machine, thus, off limits for the average luser.

But in the course of doing things that you have to do as root, when do
you need to create files in /root? Almost never. If you find that you
are using /root frequently, then I would guess that you are doing things
as root that need not be done as root. For example, someone else in this
thread says he uses /root as temporary storage for .debs, which
suggests that he is running as root when he manually downloads .debs
from non-apt-gettable sources. I would argue that he should download the
files in his ordinary user account, then use root only to install them.
In which case, obviously the files can't be in /root, because the
ordinary user account can't put them there.

 A comparison between said average lusers' home dirs and /root/ isn't
 appropriate since, again, you should only use root for administration
 tasks and not for sharing files and what not, which is what (or at
 least, the way I understand it) why the normal users' home dirs are 755.

A comparison between /home/* and /root fails because root shouldn't
really be using his home directory for much of anything.

 Furthermore, I do believe the principle of least astonishment applies
 here. I expect root's files, in root's home, to be readable _only_ by
 root.

Your opinion. The issue matters so little that I find neither 700 nor
755 surprising.

If Debian were already setting /root to 700, that would be fine with me.
But 755 is also fine. I have no particular objections to either setting.
What I am responding to here is the attitude that there's something
wrong with 755, and the insistence that it be changed.

 Arguments against 750? A sysadmin should know what he's doing and chmod
 sensitive files so that nobody can read them. As a side note, while
 discussing this, somebody asked what's stopping you from doing a 'chmod
 750 /root/'. I think the answer is that Debian shouldn't be broken, by
 default and rely on the system administrator to fix it.

It isn't broken, so that argument fails.

 That being said, should I file a bug against base-files?

No. It'll probably just get rejected anyway.

Craig


pgp56WMDHKPGC.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Craig Dickson
Birzan George Cristian wrote:

 The fact that it shouldn't be used for storing any dangerous information
 doesn't mean it's not being used for that.

If it shouldn't be used so, but it is being used so on a particular
machine, then that machine's admin is at fault.

 What I am asking, in case my original mail wasn't clear enough, is why
 _shouldn't_ it be 750 or 700 by default?

No, at this point, the question is, why should it be changed? We have an
established default of 755. You're asking for a change, but you have no
convincing argument supporting the change. Therefore, no change.

Craig


pgps6oPxOMWsc.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger

At 13:02 Uhr +0200 08.03.2003, Birzan George Cristian wrote:

the moment, are 755. IMHO, this is a possible security problem


- Why is this a possible security problem? It looks like you are 
not aware that you should always and anyways (regardless of whether 
you're root at the moment or not) take care to make sensitive files 
not world readable. If you don't have this habit then maybe you'll 
end up making sensitive files world readable in your non-root account.


- Sensitive items (like user related config files and dirs, for 
example /root/.ssh/) are 0700 regardless of user, anyways, so there's 
no need to add another protection.


- You should also be aware that a 0700 directory does not protect you 
if you are moving another directory from outside to inside, since 
users who have already chdir'd into it remain inside it. (Example:

  root:anybody:
chmod 0700 /root
# root feels safe
mkdir /blah
 chdir /blah
mv /blah /root
# root thinks ok now blah is safe
cd /root/blah
cat  info
(enter sensitive info, Ctl-D)
 cat info
 (looks at info)

- The problem with a 0700 /root is that it does not leave it a *joice* anymore.

- In fact I am using /root/bin/, /root/etc/, /root/sbin/, 
/root/libexec/ for scripts which I have written myself but should be 
for any user on the system. My /etc/skel/.bash_profile includes 
/root/bin into the user's paths.

  Why do I not use /usr/local/{bin,sbin,lib} and /etc for that?
  * I don't want my stuff to be mixed with software from other people.
  * I want to be able to easily tar my stuff up to transfer it to 
another machine.
  * Sometimes I override an existing binary living in /usr/local/bin. 
Since /root/bin is earlier in my path that's possible.


  Maybe you can tell me which other directory is better suited for 
that than /root?


I vote for leaving the permissions on /root as they are.

Christian.



Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
On Sat, Mar 08, 2003 at 08:05:26AM -0800, Craig Dickson wrote:
 But in the course of doing things that you have to do as root, when do
 you need to create files in /root? Almost never. If you find that you
 are using /root frequently, then I would guess that you are doing things
 as root that need not be done as root. For example, someone else in this
 thread says he uses /root as temporary storage for .debs, which
 suggests that he is running as root when he manually downloads .debs
 from non-apt-gettable sources. I would argue that he should download the
 files in his ordinary user account, then use root only to install them.
 In which case, obviously the files can't be in /root, because the
 ordinary user account can't put them there.

Yes, you don't need to have many files in there, but, IMHO, you
shouldn't have to worry about users being able to look into what should
be root's files. Even config files for some programs are world readable,
by default.
The first example that comes to mind, where you would want to have files
in /root/, is when you have a script of some sort, or even a program,
which should only be accessible by root. (~/bin/ is FHS compliant? I
know I use it...)

 Your opinion. The issue matters so little that I find neither 700 nor
 755 surprising.

I've talked with several other friends, and most of them (5 to 1),
agreed that /root/ shouldn't be 755, but something more restrictive.

 If Debian were already setting /root to 700, that would be fine with me.
 But 755 is also fine. I have no particular objections to either setting.
 What I am responding to here is the attitude that there's something
 wrong with 755, and the insistence that it be changed.

Think from the perspective of the not-so-clued admin which install
Debian and, even though it's mostly his fault, puts Lord knows what file
in there. Shouldn't we try to prevent that? And, not only that, but you
must remember that we are, after all, human. You may forget you didn't
set the permissions, for example, if you deal with many systems.
Shouldn't Debina try to prevent this? If the user needs/wants /root/ to
be 755, he/she can do it as it'll be obvious why it's not working, as
opposed to waiting for somebody to poke around your /root/ to find that
out.
That being said, I want to add that I'm not insisting on getting it
changed, I'm just asking if there's something wrong with 750/700 that
would cause it to not be the default. (I also find out if I've been
doing something wrong for some time by chmodding /root/ to that. :-))

 It isn't broken, so that argument fails.

There are other not broken things that are being fixed, for convenience.
There's one I remember offhand, the NMU against sysklogd for 'fixing'
something that's easily configurable by the admin (The priority of
messages that go to console).

 No. It'll probably just get rejected anyway.

I won't submit if there's a strong opposition against my idea. Even if I
do, it's not mere mortals like me who decide these kinds of things so
it's a moot point.

-- 
Regards,
Birzan George Cristian


pgpbls0OMLyli.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
On Sat, Mar 08, 2003 at 05:40:31PM +0100, Christian Jaeger wrote:
 - You should also be aware that a 0700 directory does not protect you 
 if you are moving another directory from outside to inside, since 
 users who have already chdir'd into it remain inside it.

Yes, but how often does that happen? And, don't get me wrong, I'm not
promoting blind faith in the permissions, I'm just saying I think it
would be a Good Thing. My former reply, the one to Craig Dickson,
explained not only why, but also replied to some of your other points.

 - The problem with a 0700 /root is that it does not leave it a *joice* 
 anymore.

Eh, you'll have to excuse me, but I have no idea what that phrase means.

 - In fact I am using /root/bin/, /root/etc/, /root/sbin/, 
 /root/libexec/ for scripts which I have written myself but should be 
 for any user on the system. My /etc/skel/.bash_profile includes 
 /root/bin into the user's paths.
   Why do I not use /usr/local/{bin,sbin,lib} and /etc for that?
   * I don't want my stuff to be mixed with software from other people.
   * I want to be able to easily tar my stuff up to transfer it to 
 another machine.
   * Sometimes I override an existing binary living in /usr/local/bin. 
 Since /root/bin is earlier in my path that's possible.
 
   Maybe you can tell me which other directory is better suited for 
 that than /root?

Yes. Your regular account's home.

-- 
Regards,
Birzan George Cristian


pgpMOzxJAgQJt.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 07:12:13PM +0200, Birzan George Cristian wrote:
 I've talked with several other friends, and most of them (5 to 1),
 agreed that /root/ shouldn't be 755, but something more restrictive.

I'm in agreement as well. I use /root as a common
communication area among admin staff. Admin staff
have their own home directories but prefer them keep
them private. /root is a good place to put things
which are intended to be public to the admin
group. sudo is fine for doing many things, but not
everything.

I use cfengine2 to force it at least to 750. I also
use cfengine2 to enforce all sorts of harsher
preferences so that I automatically override
some of the weaker debian settings within minutes
of doing an apt-get or dselect upgrade.

When you have multiple people, working over long
periods of time (years), with varying stress
conditions, there will at some point be mistakes
made. That's why defense in depth is so important. 
The more layers of protection you can place the
more likely a single mistake won't leave you
wide open.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--



Re: [work] Integrity (of Debian packages)

2003-03-08 Thread Jord Swart (C)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Saturday 08 March 2003 04:11, Pav wrote:

Let me have a moment of silence for your excellent reply.

Thank you, it gives me some hope again.

Jord

- -- 

Technical Consultant ECM

mailto: [EMAIL PROTECTED]

Key Fingerprint: 1856 A04C FB51 9D2D 09B2 58A5 96F6 37E0 1CF6 CCD0
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE+ajnGlvY34Bz2zNARAmoTAJwPFYnY4sMuspUceA+zg3Ikp+qbfACdHJWw
p7E2s9N1MCssLQ/Z48sxhzA=
=zISU
-END PGP SIGNATURE-



Re: Permissions on /root/

2003-03-08 Thread Ted Parvu
On Sat, Mar 08, 2003 at 06:09:08PM +0200, Birzan George Cristian wrote:
 
 The fact that it shouldn't be used for storing any dangerous information
 doesn't mean it's not being used for that. What I am asking, in case my
 original mail wasn't clear enough, is why _shouldn't_ it be 750 or 700
 by default?

Why would you want this changed but be ok with, unless I changed mine
somewhere and forgot, a default root umask of 0022 ?

just curious,

Ted

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
   WAR IS PEACE
FREEDOM IS SLAVERY
  IGNORANCE IS STRENGTH  



Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
On Sat, Mar 08, 2003 at 07:19:44PM +0100, Christian Jaeger wrote:
 Call me paranoid:) 

Yes, but if you're so paranoid, why not add another layer of protection,
by making /root/ 700?

 I meant, if /root is world-readable, then you can still make a 
 subdirectory which is not (i.e. I have a /root/tmp which is 0700). If 
 /root is not world-readable, then it can never contain stuff to be 
 used by other users.
 
This would be the default setup, not the mandatory one. Administrators
could change it to whatever they want. As I said in a previous email,
the fact that it doesn't work is going to work is pretty obvious, as
opposed to noticing that because you were sloppy once, somebody read
something they shouldn't have.

 I don't because:
 - I'm promoting my /root/{bin,...} solution for colleagues as well, 
 and we share scripts in those directories. They would have to include 
 the bin/ subdirectory of my home dir on the machines we share.
 - the scripts under /root/* are owned by root. If OTOH I'm executing 
 the $HOME/bin/ scripts of another user and his account is 
 compromised, root would be as well.
 - in my own non-root ~/bin/ are scripts that are really specific to 
 me, noone else. (And sometimes I start writing new scripts there, 
 until they are ready for everyone to be used, at which point I'm 
 moving and chown'ing them to root.)

Okay, bad example. Maybe /opt/{bin,...}? Or even /opt/mystuff/{bin,...},
if you still want to be able to tar them up easily. (arguably, this
would be easily accomplished by an alias, tarstuff will tar up
/opt/{bin,...})

The least that could be done wold be to _ask_ the user which he prefers.
As I said, there are people who aren't aware of this. Others may, as I
said, get sloppy, being used to, say, RedHat, which has it 750. I'm not
saying they're not to blame, I'm just saying they should be educated.

And if all else fails, all other things being equal, I think we should
look at which of the two scenarios is more likely to occur. How many
administrators actually use the directory structure you suggested?
(which, imho, is not FHS compliant, so it can't really constitute an
argument in 755's favour...)

-- 
Regards,
Birzan George Cristian


pgp4502loiZ6Q.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger

At 17:47 Uhr + 08.03.2003, Dale Amon wrote:

When you have multiple people, working over long
periods of time (years), with varying stress
conditions, there will at some point be mistakes
made. That's why defense in depth is so important.
The more layers of protection you can place the
more likely a single mistake won't leave you
wide open.


Isn't it the same as for any user account? If that user (who maybe 
shares his account with other people) wants his home dir private, he 
can do so. Or create a subdir which is private(*). I just see no 
reason to make a difference between root and other users.  I've 
started using my /root/bin/ -for-users approach since I've relied on 
that fact of world-readable home dirs. (Unix is socially friendly 
was a phrase in connection with permissions that I read somewhere 
when I began working with (unix/)linux.)  And as written in my other 
reply I'm still missing a better alternative to /root/bin. 
/local-admin's-software/bin maybe? AFAIK, the FHS does not provide 
any.


(*) well of course this won't help for files that have to be directly 
in root's home, like shell startup files (anybody ever made such a 
file world-writable?). But well. BTW on the solaris machine I've 
worked some time, root's home was /, and I'm sure that was not 0700.


Christian (who is going to close this thread in his mind now :-).



Re: Permissions on /root/

2003-03-08 Thread Thomas Sjögren
On Sat, 8 Mar 2003, Birzan George Cristian wrote:

  It should be locked down and not touched by adduser (Would You Like To
  Make All Homedirs World-Readable?).
 root is not the regular user. Users need o+x on their home dirs for
 Apache to be able to serve pages.

No they don't.
You shouldn't place user websites in their home dirs. Place the user
webspace in e.g  /var/www/[user] and symlink from public_html or
whatever.

/Thomas



Re: Permissions on /root/

2003-03-08 Thread Birzan George Cristian
On Sat, Mar 08, 2003 at 10:58:10AM -0800, Ted Parvu wrote:
 Why would you want this changed but be ok with, unless I changed mine
 somewhere and forgot, a default root umask of 0022 ?

Because I haven't, yet, seen a box that came, by default, with a
different umask. Again, for me it's about the principle of least
astonishment...

-- 
Regards,
Birzan George Cristian


pgp0ABBDzqMgX.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Stefan Neufeind
On 8 Mar 2003 at 17:40, Christian Jaeger wrote:

 At 13:02 Uhr +0200 08.03.2003, Birzan George Cristian wrote:
 - You should also be aware that a 0700 directory does not protect you
 if you are moving another directory from outside to inside, since
 users who have already chdir'd into it remain inside it. (Example:
root:anybody:
  chmod 0700 /root
  # root feels safe
  mkdir /blah
   chdir /blah
  mv /blah /root
  # root thinks ok now blah is safe
  cd /root/blah
  cat  info
  (enter sensitive info, Ctl-D)
   cat info
   (looks at info)

why is he allowed to use mv /blah /root? /root is write-protected 
so why could he move blah inside of it?



Re: Permissions on /root/

2003-03-08 Thread Craig Dickson
[EMAIL PROTECTED] wrote:

 how about offering it as an installation option?
 * /root/ permission
 some say 755 because ...
 others
 700 because ...
 please select [700 | 750 | 755]
 
 or whatever options seem sensible...

Because it's unnecessary. Installation is already too cluttered with
various choices the user has to make, most of which are more important
than this one.

It doesn't matter much whether /root is 755, 750, or 700. The sensible
thing to do is just choose one and stick with it. The user can change it
after installation if they like. Right now Debian either uses 755 or
sets /root to be the same as /home/*; I'm not sure which. If you want
that to change, you need a better argument than anything that has been
presented so far.

Craig



pgpJh8c8s9Q0y.pgp
Description: PGP signature


Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 08:07:51PM +0100, Christian Jaeger wrote:
 Isn't it the same as for any user account? If that user (who maybe 
 shares his account with other people) wants his home dir private, he 
 can do so. Or create a subdir which is private(*). I just see no 

Typical user accounts are not the same as the root 
user unless you go to selinux where you have to 
assume the admin role to actually do anything. Since
I'm not running selinux on any production servers (yet)
I prefer to put as severe a wall as I can between luser
and root as I possibly can.

The friendliness of privs depends very much on what
it is you are doing. If the machine happens to be
a firewall protecting a LAN with proprietary data,
or a web server with many large web sites, the
criteria are rather different.

As I said, I use /root more as the common home for
the admin group. Not necessarily security important 
things there all the time, but sometimes transiently 
there is.

Security means turn everything off until the machine
is totally unusable, and then turn them back on until
you've got precisely what is required for the purpose
and no more.

Life will get easier when selinux goes more main 
stream as these things will be easily handled via
policy rather than file owner/mode settings.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--



Re: Permissions on /root/

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 08:16:38PM +0100, Thomas Sj?gren wrote:
  root is not the regular user. Users need o+x on their home dirs for
  Apache to be able to serve pages.
 
 No they don't.
 You shouldn't place user websites in their home dirs. Place the user
 webspace in e.g  /var/www/[user] and symlink from public_html or
 whatever.

I sometimes do, however it complicated the back up of
individuals. With rsync these days, the user backup 
problem on a rack of machines is pretty moot, so 
I'll give you that.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--



Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger

At 20:23 Uhr +0100 08.03.2003, Stefan Neufeind wrote:

On 8 Mar 2003 at 17:40, Christian Jaeger wrote:


 At 13:02 Uhr +0200 08.03.2003, Birzan George Cristian wrote:
 - You should also be aware that a 0700 directory does not protect you
 if you are moving another directory from outside to inside, since
 users who have already chdir'd into it remain inside it. (Example:

 root:   anybody:
 -   -
   chmod 0700 /root

  # root feels safe
  mkdir /blah
 chdir /blah
  mv /blah /root
  # root thinks ok now blah is safe
  cd /root/blah
  cat  info
  (enters sensitive info, Ctl-D)

  cat info
  (looks at info)

why is he allowed to use mv /blah /root? /root is write-protected
so why could he move blah inside of it?


It is *root* who is moving the dir. (Left side. I've increased the 
space a bit.) And he (is root masculine?) is moving anybody right 
into the secret area at the same time.




unsubscribe

2003-03-08 Thread Helmut Martin



Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes:

 I began working with (unix/)linux.)  And as written in my other reply
 I'm still missing a better alternative to
 /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does
 not provide any.

Maybe /usr/local/sbin is, what you're looking for?

Regards, Olaf.



Re: [work] Integrity of Debian packages

2003-03-08 Thread Andreas Kotes
Hi!

this is off topic, but in case you've been wondering, too:

* Joost Beintema [EMAIL PROTECTED] [20030308 04:47]:
  Your comment seems to lay blame for 9/11 on the intelligence community. 
  It's fair to say that they had major flaws at that time (and possibly 
  now as well). You could argue that this specific incident could have 
  been prevented if certain measures were in place. Keep in mind, the 
  perpetrators were a determined group that was willing to accept death in 
  the pursuit of their goal. That's a combination that is nearly unstoppable.
 
 All I hear is a war-yelling Bush but I haven' heared any good story (from
 politicians) about the WHY of attacks.

economic reasons:

- the oil price influences a HUGE part of the economy, having to pay the
  market price for iraq oil doesn't work
- the bush family is a not-so-small player in weapons industry as well
  as oil industry
- deficit/military/government spending is good for the economy (any
  economist can tell you that) .. the formula:

  GDP = C+G+I+X-Im
  (where:
  GDP == Gross Domestic Product
  C   == Consumption
  G   == Government spending
  I   == Investments
  X   == Exports
  Im  == Imports)

  .. this very formular also explains tax cuts, the deficit, the hype
  against foreign products / Imports, etc.
- military spending:
  Irak:~ 20.0% of GDP
  USA: ~  5.5% of GDP (!)
  Germany: ~  3.5% of GDP
  .. reasoning goes that a raise of spending for weapons beyond a
  general percentage is a precursor for war - as it has always been

  the actual values don't seem to matter much - the fact that the US
  just have a _huge_ GDP does count a lot .. $400 _billion_ military
  expenses a year are 'only' 5.5% .. the ~$26 billion offered to turkey
  are interesting, too. far more interesting are the ~$15 _million_ for
  post-war refugee help (UNHCR). 

  another question: how could iraq to something decent using its money,
  considering the sanctions and the interweavement of countries these
  times?
- old ammunition and weapon technologies have to be -uh- put out of
  service

political reasons:

- gaining access to he iraq oil fields would lessen the influence of
  OPEC, thus the oil price
- solving the palaestina/israel conflict would compromise israel
- disrupting europe unity means keeping relative strength

pyschological reasons:

- giving in to europe would mean losing face
- admiting one was wrong would mean losing face
- searching problems everywhere else but at home is far easier than
  facing reality
- powerlessness (e.g. regarding 9/11) of oneself usually results in
  applying power to others

.. just guessing. I'm pretty sure there are more in each category.

   Count

-- 
Andreas Kotes - ICQ: 3741366 - The views expressed herein are (only) mine.
Unser Leben ist das, wozu unser Denken es macht. -- OpenPGP key 0x8F94C228
Our Life is what our thinking makes it.. Your mind is a weapon! Arm it ..



Re: [VERY Offtopic] Politics (was Debian Package Integrity)

2003-03-08 Thread David Ehle
control over members of his Branch Davidian followers, as Saddam Hussein
does over the Iraqis. The parallel does not stop there.

Law enforcement authorities were certain Koresh had accumulated a
formidable arsenal of weapons and ammunition at his compound and may have
been planning on using them someday. The FBI also had evidence that he was
sexually abusing young girls in the cult. After the first law enforcement
assault failed, after losing the element of surprise, the Branch Davidian
compound was contained and steadily increasing pressure was applied for
weeks. But then the FBI decided it could wait no longer and mounted the
second assault with disastrous consequences. The children we sought to
liberate all died when Koresh and his followers set fires leading to their
mass death and destruction.

The FBI, of course, cannot be blamed for what Koresh set in motion.
Nevertheless, we learned some lessons from this unfortunate episode and
quickly explored better ways to deal with such challenges. As a direct
result of that exploration, many subsequent criminal/terrorist standoffs
in which the FBI has been involved have been resolved peacefully and
effectively. I would suggest that present circumstances vis-a-vis Iraq are
very analagous, and that you consider sharing with senior administration
officials the important lessons learned by the FBI at Waco.

You are only too well aware that fighting the war on terrorism and crime
is an unbelievably difficult mission that will only become more difficult
in the years to come, adversely affecting future generations of Americans.
The extraneous pressures currently being brought to bear by politicians of
both parties upon the FBI and other U.S. intelligence agencies, however,
only worsen the present situation.

I know that my comments appear so presumptuous for a person of my rank in
the organization and I'm very sorry for that impression. A word of
explanation is therefore probably in order as to why I feel moved to write
you directly about these issues. A good part of the reason lies in a
promise I made to myself after I realized the enormity of what resulted
when FBI Headquarters Supervisory personnel dismissed the warnings of
Minneapolis agents pre-September 11, 2001. I was well aware of the
forceful but frustrated efforts being made by Minneapolis case agents and
their supervisor in their efforts to get Headquarters to move. But since
my own role was peripheral, I did not think I could be of much additional
help. Since that fateful day of September 11, 2001, however, I have not
ceased to regret that perhaps I did not do all that I might have done.

I promised myself that in the future I would always try.

I appreciate that you alone do not determine policy on the terrorist
threat from inside or outside the country, that, indeed, you may have
little influence in the crafting of broad domestic or foreign policy. And
it seems clear to me now that the decision to attack Iraq was taken some
time ago and you, even as FBI Director, may be little more than a helpless
bystander.

Such an attack, though, may have grave consequences for your ability to
discharge your responsibility to protect Americans, and it is altogether
likely that you will find yourself a helpless bystander to a rash of
9-11s. The bottom line is this: We should be deluding neither ourselves
nor the American people that there is any way the FBI, despite the various
improvements you are implementing, will be able to stem the flood of
terrorism that will likely head our way in the wake of an attack on Iraq.
What troubles me most is that I have no assurance that you have made that
clear to the president.

If you believe my concerns have merit, I would ask you to share them with
the president and attorney general. We no doubt can agree that our
Government has a gargantuan task facing it of melding American foreign
policy to make the world, and primarily United States soil, a safer place.
I pray for our American and allied world leaders^Ò success in achieving
this most important objective.

Thank you so much for allowing me to express these thoughts. They are
personal in nature and should not be construed as representing the view of
any FBI unit or other agents.

Yours truly,

Coleen Rowley




On Sun, 9 Mar 2003, Andreas Kotes wrote:

 Hi!

 this is off topic, but in case you've been wondering, too:

 * Joost Beintema [EMAIL PROTECTED] [20030308 04:47]:
   Your comment seems to lay blame for 9/11 on the intelligence community.
   It's fair to say that they had major flaws at that time (and possibly
   now as well). You could argue that this specific incident could have
   been prevented if certain measures were in place. Keep in mind, the
   perpetrators were a determined group that was willing to accept death in
   the pursuit of their goal. That's a combination that is nearly 
   unstoppable.
 
  All I hear is a war-yelling Bush but I haven' heared any good story (from
  politicians) about the WHY of attacks

Re: [VERY Offtopic] Politics (was Debian Package Integrity)

2003-03-08 Thread Dale Amon
On Sat, Mar 08, 2003 at 06:18:13PM -0600, David Ehle wrote:
 
 Ok I've resisted this thread for quite a while because its so off topic...
 but since nobody is complaining... I'm going to post a facinating letter
 from inside the FBI I ran across recently. I havn't done much work
 checking authenticity but even its bogus it makes some great points.

Please! I've read her thing before. It's real and has
been in the news. Some agree with her and some don't,
and it is very much on party lines. I read plenty
of this elsewhere, which is where this discussion 
should be taken. alt.conspiracy, I don't much care,
but not here.

If you want my opinions, you'll have read them
elsewhere:
http://www.samizdata.com/blog
where I am an editor. 

Now *please* get back to debian security.

-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--



Re: Permissions on /root/

2003-03-08 Thread Christian Jaeger

At 23:29 Uhr +0100 08.03.2003, Olaf Dietsche wrote:

Christian Jaeger [EMAIL PROTECTED] writes:

  I began working with (unix/)linux.)  And as written in my other reply
  I'm still missing a better alternative to
  /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does
  not provide any.

Maybe /usr/local/sbin is, what you're looking for?


No, this is still a directory generally used for local tar.gz 
installs. And sbin is for admins, bin for users, right?.


(The suggestion to use /opt/* is ok. It's (as I've just realized) 
even what the FHS stipulates: the directories /opt/bin, /opt/doc, 
/opt/include, /opt/info, /opt/lib, and /opt/man are reserved for 
local system administrator use. Hmm, Debian does not create any of 
the /opt (and /opt/{bin,doc,include,info,lib,man}), /var/opt, and 
/etc/opt directories in it's standard installation, and does not even 
mention those in the policy (chapter 10.1). I'll maybe have to set up 
cfengine to create those.. ;-).)


Christian.



Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes:

 At 23:29 Uhr +0100 08.03.2003, Olaf Dietsche wrote:
Christian Jaeger [EMAIL PROTECTED] writes:

   I began working with (unix/)linux.)  And as written in my other reply
   I'm still missing a better alternative to
   /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does
   not provide any.

Maybe /usr/local/sbin is, what you're looking for?

 No, this is still a directory generally used for local tar.gz
 installs. And sbin is for admins, bin for users, right?.

Yup, I misinterpreted, what you mean with /local-admin's-software/bin.

Regards, Olaf.



Re: [VERY Offtopic] Politics (was Debian Package Integrity)

2003-03-08 Thread Dale Amon
On Sun, Mar 09, 2003 at 02:30:11AM +0100, Thomas Ritter wrote:
 Am Sonntag, 9. M?rz 2003 01:52 schrieb Dale Amon:
  http://www.samizdata.com/blog

Oops. http://www.samizdata.net/blog 


-- 
--
   IN MY NAME:Dale Amon, CEO/MD
  No Mushroom clouds over Islandone Society
London and New York.  www.islandone.org
--