Re: risks of using net apps as a user in wheel or adm?

2007-11-04 Thread Andrew Sackville-West
On Sun, Nov 04, 2007 at 07:23:47PM +, Joe wrote:

...
>
> It was to do with the original point, active client-side content of web 
> pages, really. This was the 'vast majority of downloaded software' I
meant, 

sorry, I musunderstood that point...

> and was contrasting it with the distribution of system executables, which 
> is done relatively safely. Microsoft may not be as ethical as we would 
> like, but so far the actual distribution system has remained fairly 
> tamper-proof. Whatever malicious software ends up in the machine is exactly 
> the malicious software that Microsoft meant to distribute. And if the use 
> of apt reached Windows-like proportions, how many people would manually 
> invoke it each day? How many would scour the Internet for half an hour 
> first, looking for evidence that the pending updates were safe or
> not?

I agree with you here. In fact, we basically agree across the board
here, we just suffer from the medium's lack of nuance. ;)

> But hey, I 
> deal with my government, whose ethics are lower still.

shudder. I feel for you. at the moment, I am largely insulated from
*that* horror. 

cheers.

A
 


signature.asc
Description: Digital signature


Re: risks of using net apps as a user in wheel or adm?

2007-11-04 Thread Joe

Andrew Sackville-West wrote:

On Sat, Nov 03, 2007 at 10:41:35AM +, Joe wrote:

Andrew Sackville-West wrote:

On Fri, Nov 02, 2007 at 09:29:51PM +, Joe wrote:
Microsoft Update and apt-get are probably as close as you get, and I 
wouldn't bet a large amount of money that either is 100% safe. One day MU 
will get hacked, and the whole world will collapse.



wow, that's quite a comparison: Microsoft Update which will secretly
upgrade stuff on the system even when explicitly told not to versus
apt-get which must be explicitly told what to do and then asks "are
you sure?" And I won't even go into the parts where you get to look at
apt code...
Frankly I hope MU does get hacked (if it hasn't already) because some
people need to learn some lessons, not the least of which is MS itself
for releasing such tragically flawed software to begin with. Note though 
that I do not wish ill upon the poor users of this

product... merely that the PTB's over there would get a clue (and yes
I know many of them do have a clue, just not enough or the right ones).
Ah, I wasn't comparing operational use, 


fair enough...

just the systems as being 
reasonably tamper-proof methods of delivering software from the original 
sources to the user.


see, there is a significant difference here. MU allows kernel level
software upgrades to be loaded into the system without admin
intervention or knowledge. So it appears to me that MU is *not*
reasonably tamper-proof and is infact designed to be tampered with..

The vast majority of downloaded software comes from 
unidentifiable sources via paths which are relatively easily hacked.


The vast majority of whose software? All mine comes from signed
archives with keys that I can verify. 


The MU issue is simply one of monoculture, not software quality.


I disagree. The whole MU issue is about fundamentally flawed ideas
 about software. The software produced from a flawed concept (that its
 okay to have some party arbitrarily install kernel level software
 remotely without admin interaction) is flawed and not quality
 software.

If 90% of 
the world's PCs used apt-get daily, the repercussions of malware smuggled 
into major packages would be just as serious as an MU hack today.


Yes, except again, if the apt repositories were compromised, we would
still have the option to not bother typing apt-get upgrade (once the
news got out, of course. Some would surely still fall...). If someone
hacks MU, then that hack can be distributed automatically to every box
to be automatically installed even if the admin has turned off the
automatic install "feature".

BTW, I'm not sure that we're actually arguing here. It maybe that I
just don't understand what you're saying :)



It was to do with the original point, active client-side content of web 
pages, really. This was the 'vast majority of downloaded software' I 
meant, and was contrasting it with the distribution of system 
executables, which is done relatively safely. Microsoft may not be as 
ethical as we would like, but so far the actual distribution system has 
remained fairly tamper-proof. Whatever malicious software ends up in the 
machine is exactly the malicious software that Microsoft meant to 
distribute. And if the use of apt reached Windows-like proportions, how 
many people would manually invoke it each day? How many would scour the 
Internet for half an hour first, looking for evidence that the pending 
updates were safe or not?


My point was that the mass of JS, Flash etc. which is taken as a normal 
part of web browsing, is as Doug said back in the beginning, the 
execution of someone else's programs on your computer. I'm not convinced 
it's the right way to be going, and I'd like to see the processing done 
on the server, with only the client's screen being affected by the 
result. I doubt that many Linux users would disagree, it's always been 
the Windows world that has pushed the PC as an entertainment machine, 
owned by Microsoft and the other software writers rather than the person 
who paid for it. A few more attributes of html tags would in my mind be 
preferable to requiring JS for quick entry validation, for example. I'm 
a bit uneasy that even banks seem to find JS indispensable, when for the 
kind of simple user entry processing involved, it certainly isn't.


And while I'm a user of Windows, and indeed a Microsoft Partner, it's 
purely for economic reasons. I sup with the longest spoon I can find, 
and I've yet to find a good word to say about the company itself. But 
hey, I deal with my government, whose ethics are lower still.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: risks of using net apps as a user in wheel or adm?

2007-11-03 Thread Andrew Sackville-West
On Sat, Nov 03, 2007 at 10:41:35AM +, Joe wrote:
> Andrew Sackville-West wrote:
>> On Fri, Nov 02, 2007 at 09:29:51PM +, Joe wrote:
>>> Microsoft Update and apt-get are probably as close as you get, and I 
>>> wouldn't bet a large amount of money that either is 100% safe. One day MU 
>>> will get hacked, and the whole world will collapse.
>>>
>> wow, that's quite a comparison: Microsoft Update which will secretly
>> upgrade stuff on the system even when explicitly told not to versus
>> apt-get which must be explicitly told what to do and then asks "are
>> you sure?" And I won't even go into the parts where you get to look at
>> apt code...
>> Frankly I hope MU does get hacked (if it hasn't already) because some
>> people need to learn some lessons, not the least of which is MS itself
>> for releasing such tragically flawed software to begin with. Note though 
>> that I do not wish ill upon the poor users of this
>> product... merely that the PTB's over there would get a clue (and yes
>> I know many of them do have a clue, just not enough or the right ones).
>
> Ah, I wasn't comparing operational use, 

fair enough...

> just the systems as being 
> reasonably tamper-proof methods of delivering software from the original 
> sources to the user.

see, there is a significant difference here. MU allows kernel level
software upgrades to be loaded into the system without admin
intervention or knowledge. So it appears to me that MU is *not*
reasonably tamper-proof and is infact designed to be tampered with..

> The vast majority of downloaded software comes from 
> unidentifiable sources via paths which are relatively easily hacked.

The vast majority of whose software? All mine comes from signed
archives with keys that I can verify. 

>
> The MU issue is simply one of monoculture, not software quality.

I disagree. The whole MU issue is about fundamentally flawed ideas
 about software. The software produced from a flawed concept (that its
 okay to have some party arbitrarily install kernel level software
 remotely without admin interaction) is flawed and not quality
 software.

> If 90% of 
> the world's PCs used apt-get daily, the repercussions of malware smuggled 
> into major packages would be just as serious as an MU hack today.

Yes, except again, if the apt repositories were compromised, we would
still have the option to not bother typing apt-get upgrade (once the
news got out, of course. Some would surely still fall...). If someone
hacks MU, then that hack can be distributed automatically to every box
to be automatically installed even if the admin has turned off the
automatic install "feature".

BTW, I'm not sure that we're actually arguing here. It maybe that I
just don't understand what you're saying :)

A


signature.asc
Description: Digital signature


Re: risks of using net apps as a user in wheel or adm?

2007-11-03 Thread Douglas A. Tutty
On Sat, Nov 03, 2007 at 10:41:35AM +, Joe wrote:
> Andrew Sackville-West wrote:
> >On Fri, Nov 02, 2007 at 09:29:51PM +, Joe wrote:
> >>Microsoft Update and apt-get are probably as close as you get, and 
> >>I wouldn't bet a large amount of money that either is 100% safe. One day 
> >>MU will get hacked, and the whole world will collapse.
> >>
> >
> >wow, that's quite a comparison: Microsoft Update which will secretly
> >upgrade stuff on the system even when explicitly told not to versus
> >apt-get which must be explicitly told what to do and then asks "are
> >you sure?" And I won't even go into the parts where you get to look at
> >apt code...
> >
> >Frankly I hope MU does get hacked (if it hasn't already) because some
> >people need to learn some lessons, not the least of which is MS itself
> >for releasing such tragically flawed software to begin with. 
> >
> >Note though that I do not wish ill upon the poor users of this
> >product... merely that the PTB's over there would get a clue (and yes
> >I know many of them do have a clue, just not enough or the right ones).
> >
> 
> Ah, I wasn't comparing operational use, just the systems as being 
> reasonably tamper-proof methods of delivering software from the original 
> sources to the user. The vast majority of downloaded software comes from 
> unidentifiable sources via paths which are relatively easily hacked.
> 
> The MU issue is simply one of monoculture, not software quality. If 90% 
> of the world's PCs used apt-get daily, the repercussions of malware 
> smuggled into major packages would be just as serious as an MU hack today.
> 

Right, but what about on a stock Debian system (no windows), using
iceweasel with javascript and flashplayer while a member of wheel, ssh,
adm, staff, and having important info and documents in one's home
directory?

Would it be better to have a separate user not a member of any special
groups (perhaps rdtutty instead of dtutty) then put a /home/rdtutty/uldl
directory owned rdtutty.dtutty and symlinked to /home/dtutty/uldl.  This
would facilitate file transfer of downloads (such as OS .iso's, pdf's,
etc)?

Would that fully protect my stuff, or is the whole box's security at
some risk having any user on a box run iceweasel, javascript, and flash?

Doug.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: risks of using net apps as a user in wheel or adm?

2007-11-03 Thread Joe

Andrew Sackville-West wrote:

On Fri, Nov 02, 2007 at 09:29:51PM +, Joe wrote:
Microsoft Update and apt-get are probably as close as you get, and 
I wouldn't bet a large amount of money that either is 100% safe. One day MU 
will get hacked, and the whole world will collapse.




wow, that's quite a comparison: Microsoft Update which will secretly
upgrade stuff on the system even when explicitly told not to versus
apt-get which must be explicitly told what to do and then asks "are
you sure?" And I won't even go into the parts where you get to look at
apt code...

Frankly I hope MU does get hacked (if it hasn't already) because some
people need to learn some lessons, not the least of which is MS itself
for releasing such tragically flawed software to begin with. 


Note though that I do not wish ill upon the poor users of this
product... merely that the PTB's over there would get a clue (and yes
I know many of them do have a clue, just not enough or the right ones).



Ah, I wasn't comparing operational use, just the systems as being 
reasonably tamper-proof methods of delivering software from the original 
sources to the user. The vast majority of downloaded software comes from 
unidentifiable sources via paths which are relatively easily hacked.


The MU issue is simply one of monoculture, not software quality. If 90% 
of the world's PCs used apt-get daily, the repercussions of malware 
smuggled into major packages would be just as serious as an MU hack today.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: risks of using net apps as a user in wheel or adm?

2007-11-02 Thread Andrew Sackville-West
On Fri, Nov 02, 2007 at 09:29:51PM +, Joe wrote:
> Microsoft Update and apt-get are probably as close as you get, and 
> I wouldn't bet a large amount of money that either is 100% safe. One day MU 
> will get hacked, and the whole world will collapse.
>

wow, that's quite a comparison: Microsoft Update which will secretly
upgrade stuff on the system even when explicitly told not to versus
apt-get which must be explicitly told what to do and then asks "are
you sure?" And I won't even go into the parts where you get to look at
apt code...

Frankly I hope MU does get hacked (if it hasn't already) because some
people need to learn some lessons, not the least of which is MS itself
for releasing such tragically flawed software to begin with. 

Note though that I do not wish ill upon the poor users of this
product... merely that the PTB's over there would get a clue (and yes
I know many of them do have a clue, just not enough or the right ones).

A


signature.asc
Description: Digital signature


Re: risks of using net apps as a user in wheel or adm?

2007-11-02 Thread Joe

Douglas A. Tutty wrote:

This is a more general question to an issue that came up in another
thread.

Not to single out Iceweasel but, for example, IIUC, javascript and
flashplayer end up running someone else's code on your computer as you.  


What are the security implications of this?  What could a malicious
flash or piece of javascript really do you files in your home directory?

What are the security implications of this if you are also a member of
group wheel, adm, or staff?

As for my home directory, of course it has security-sensitve info:
health info, passwords, and other private documents.

Should I have a separate user setup for just running a javascript- and
flash-enabled web browser?


I would, but see below.


I know that any software can have bugs, but I think that software that
has to keep up with features to be useable (e.g. a browser) is more
likely to be at risk of unknown exploits than more feature-stable
net-apps such as mutt, exim, ftp, or rsync.

No doubt about that, though I don't think there's any way to quantify or 
even guess the risk, other than by saying 'less is better'. 
Unfortunately, cross-platform content also implies cross-platform 
malware. We can't just rely on not being Windows users, and I suspect 
that all 'technologies' are capable of much more harm than their 
inventors intended. We now have PDF malware. The bad guys are just plain 
more inventive.


I can do most of what I need with Iceweasel without flash and with 
No-Script, and I'm not a member of any useful security groups. I read 
secure logs with a sudo-ed mc in a terminal. I'd rate my paranoia as at 
least 90% of the theoretical 'pull-all-the-plugs-out' maximum. But then 
I've also run various versions of Windows for more than ten years, 
mostly without AV, without ever picking up anything unwanted, so it does 
help.


There's just no safe way of running other peoples' software on your 
machine. Microsoft Update and apt-get are probably as close as you get, 
and I wouldn't bet a large amount of money that either is 100% safe. One 
day MU will get hacked, and the whole world will collapse.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: risks of using net apps as a user in wheel or adm?

2007-11-02 Thread Andrew Sackville-West
On Fri, Nov 02, 2007 at 02:41:11PM -0400, Celejar wrote:
> On Fri, 2 Nov 2007 13:19:58 -0400
> "Douglas A. Tutty" <[EMAIL PROTECTED]> wrote:
> 
> > This is a more general question to an issue that came up in another
> > thread.
> > 
> > Not to single out Iceweasel but, for example, IIUC, javascript and
> > flashplayer end up running someone else's code on your computer as you.  
> > 
> > What are the security implications of this?  What could a malicious
> > flash or piece of javascript really do you files in your home directory?
> > 
> > What are the security implications of this if you are also a member of
> > group wheel, adm, or staff?
> 
> I would add that many users, especially on single user machines,
> probably have something like:
> 
> username ALL = NOPASSWD: ALL
> 
> in /etc/sudoers

well, that's a problem. I don't do that on any machine, just because I
want to be forced to enter a sudo password so that I think that extra
thought before doing whatever it is I'm about to do. 

Now for specific commands? sure like NOPASSWD:/sbin/shutdown on my
laptop, because that's just convenient and if someone wants to hack my
lappy and shut it down, well, more power to them...

A


signature.asc
Description: Digital signature


Re: risks of using net apps as a user in wheel or adm?

2007-11-02 Thread Celejar
On Fri, 2 Nov 2007 13:19:58 -0400
"Douglas A. Tutty" <[EMAIL PROTECTED]> wrote:

> This is a more general question to an issue that came up in another
> thread.
> 
> Not to single out Iceweasel but, for example, IIUC, javascript and
> flashplayer end up running someone else's code on your computer as you.  
> 
> What are the security implications of this?  What could a malicious
> flash or piece of javascript really do you files in your home directory?
> 
> What are the security implications of this if you are also a member of
> group wheel, adm, or staff?

I would add that many users, especially on single user machines,
probably have something like:

username ALL = NOPASSWD: ALL

in /etc/sudoers

> Doug.

Celejar
--
mailmin.sourceforge.net - remote access via secure (OpenPGP) email
ssuds.sourceforge.net - A Simple Sudoku Solver and Generator


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]