Re: [leaf-user] Re: [Leaf-devel] Re: Software write-protect (Was: Re: [leaf-user] Floppies)

2002-06-30 Thread guitarlynn

How about if you modify tinylogin to email [EMAIL PROTECTED] 
everytime the box is logged into???

-- 

~Lynn Avants
aka Guitarlynn

guitarlynn at users.sourceforge.net
http://leaf.sourceforge.net

If linux isn't the answer, you've probably got the wrong question!


---
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf

___
Leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel



Re: [Leaf-devel] Weblet Enhancements

2002-06-30 Thread guitarlynn

Sorry about my lateness in responding, but I was out of town
for the last several days. This post will consolidate reply's from
several posts in my absence.

Comments are inline  ;-)


> Security:  This is critical if external access is to be provided, but
> not really an issue if the internal network is trusted.  While SSL
> would be ideal for encrpting external sessions, let's not forget
> about ssh. If you already have ssh installed, it's possible to tunnel
> through ssh to access an un-encrypted weblet running on an internal
> private-IP port remotely.  This requires ssh in addition to a
> web-browser on the remote system, but is quite workable.  NOTE:  The
> Cygwin ssh client from RedHat works just fine for this sort of thing
> if you're running a windoze platform.

ssh would be ideal, except on floppy images. Maybe zebedee is going
to be the best option for remote floppy administration @61KB. See later
section.


> Funtionality:  It would really be nice if the web server supported
> the POST method.  There is no fundamental reason why you can't do
> this with shell-script, and I believe it's already been done.

James Sturdevant posted POST support in patch form to the list a while
back. I think this will work fine.


> Performance:  The sh-httpd server is kind of slow when serving up CGI
> pages.  This is due to the way the shell-script handles spawning the
> child CGI process, and checking to see if it's finished.  I think
> this can be re-architected to perform much better...when I was
> working on sh-httpd, I didn't know I could open multiple file-handles
> in shell-script, which makes the above problem easier.

I don't think much CGI would be required with the use of forms, ash
scripts, and limiting access to localhost. 


> CGI Scripts:  Since it's unlikely that LEAF systems will start
> including perl, python, or anything similar in the near future
> (mainly due to space constraints), I think shell-scripts are the best
> choice for CGI's. If there's something that can't quite be done with
> sed/grep/dd, I would probably suggest using mawk, which I already
> have packaged (required by IPSec), and which weighs in at 45,956
> bytes (compressed).

I agree 100% with that statement.
I am using forms (of course), which POST on individual lines. I think
sed and stock ash are fine w/o needing mawk. The forms would use 
stock variables (ie... eth0_IP_ADDR) when the "option" sets a single
variable and a new variable to set several "stock" variables when
applicable (ethernet-dhcp, ppp-dhcp, etc...). The added scripting needed
to interpret the added variables would be put in network.conf. As far
as changes to the network.conf "standard", I propose modularizing
certain sections of declared variables into their own form/conf file,
then "sourcing" these new conf files into the "script-only"
network.conf file. Example of the break-up of network.conf would be
something along the lines of "base-config, advanced-net, qos, and dmz." 
This will minimize the amount of needed CGI code run. This would also
allow for a CLI-config set of scripts so that you can edit all
configuration on the LEAF machine itself with the same ash/cgi scripts
that the web-based admin uses. Thoughts???

> Modularity:  Seems like a good thing!  The more flexable the
> architecture, the more likely it is to meet the various needs of the
> pretty diverse user base we have for LEAF.

This will likely be the only way to keep it on a floppy image. This
would also help with portability between different versions of LEAF.
It would allow for saving each "module" individually, so that small
changes would use minimal resources and accidental errors would
be less of an issue. We could also add a link to a "config-barf" CGI 
file that could auto-magically post comments+config information via
a web-form to the mailing list. 

My use of starting with DF is simply that I am very familiar with the
release and my lack of knowledge with Shorewall. Bering would likely
be easier to work with, however most code should be relatively portable
with variable & conf file name changes. I expect with the amount of
people that are willing to work on this, that parallel development
between releases will be no problem.

Scott, I love your idea this would be beautiful in environments that
would have a server available However, a huge amount of our users
will not, so we are simply working around the requirment of hand 
editing configuration in a minimal amount of disk-space. I'm hoping
something that is stand-alone on a floppy is possible.



At 10:31 PM 6/26/02 +0200, Erich Titl wrote:
>I am playing around with weblet to get some kind of a web based 
>configuration. Authentication is certainly an issue there and I am 
very 
>interested in anything that should come up in that aspect.

Let's consider this. only a certain set of machines *should* be
allowed access to configuration period. Weblet/sh-httpd allows
for setting allowed hosts in the present configuration an

[Leaf-devel] Re: Software write-protect (Was: Re: [leaf-user] Floppies)

2002-06-30 Thread Manfred Schuler

Jeff Newmiller schrieb:

[...]

> I think the executables-only-on-read-only-mounted devices idea has merit.
> I am, however, somewhat bothered about having to reboot into an alternate
> excution environment before making configuration changes because of the
> usability factor... only a very small minority of people putting together
> a new LEAF box could do it without testing on the fly.  Write-protect is a
> very simple, direct solution to this problem, while your option has
> potential to be rather operator-unfriendly.

That's right, in the meantime I have abandonded the idea of booting to
another runlevel, but I see no way to avoid rebooting to remove the
write protection. This is inherent to this principle.

There will be a list of files that must be writeable so the user
can decide what will be configurable on the running system.
Another option is to configure the system without using the wp package.
There will also be the possibility to decide at boot time to use
the write protection, with a configurable timeout to allow unattended
reboots.

[...]

-- 
Manfred Schuler
E_Mail: mailto:[EMAIL PROTECTED]


---
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf

___
Leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel



[Leaf-devel] Re: Software write-protect (Was: Re: [leaf-user] Floppies)

2002-06-30 Thread fkamp

I fail to see any benefit to using software write-protect when hardware
write protect is convenient, easy and fool proof.

Simply move the write protect tab into the protect position and its
done.  The only way to unprotect it is to physically move the tab back
to the writable position.  That can't be compromised without physical
acess to the disk.

Frank Kamp


---
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf

___
Leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel



[Leaf-devel] Re: Software write-protect (Was: Re: [leaf-user] Floppies)

2002-06-30 Thread Jeff Newmiller

On 30 Jun 2002, Mike Noyes wrote:

> On Sun, 2002-06-30 at 05:07, Manfred Schuler wrote:

[...]

> > Also I am a little bit astonished as all people
> > on the list agree that any additional level of
> > protection is an improvement. But in the discussion
> > about software-wp people argument as if it would
> > make things worse.
> 
> We've lived with hardware write-protection for a long time, and we know
> it works. There is usually resistance to change, but it's rarely
> insurmountable.

I think the executables-only-on-read-only-mounted devices idea has merit.  
I am, however, somewhat bothered about having to reboot into an alternate
excution environment before making configuration changes because of the
usability factor... only a very small minority of people putting together
a new LEAF box could do it without testing on the fly.  Write-protect is a
very simple, direct solution to this problem, while your option has
potential to be rather operator-unfriendly.

> > I still think it is an improvement of security to
> > protect the ramdisk and to restrict access to the
> > boot device as far as possible. This increases the
> > required skills of an intruder and also the chances
> > to detect an intruder.
> > If you check the mounting options of the ramdisks 
> > every second, an intruder has only one second to
> > compromise the system and to install and run the
> > tools to hide the intrusion.
> > 
> > The protection can completely be done in a package.
> > A few changes (make /var a seperate file system,
> > separate mount from busybox) in the base system
> > would make things easier and do no harm to the
> > system. The user can then decide to use the package
> > or not.
> > 
> > I'm short of free time at the moment, but maybe in
> > the next weeks I get the occasion to make a
> > beta-version of this package. I will post then the
> > information on the list when it is available.
> 
> Please do. It's always worthwhile to look at new ideas. Please post your
> package information on the devel list when it's ready.

I, too, will be interested to see if my concerns are unfounded. :)

---
Jeff NewmillerThe .   .  Go Live...
DCN:<[EMAIL PROTECTED]>Basics: ##.#.   ##.#.  Live Go...
  Live:   OO#.. Dead: OO#..  Playing
Research Engineer (Solar/BatteriesO.O#.   #.O#.  with
/Software/Embedded Controllers)   .OO#.   .OO#.  rocks...2k
---



---
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf

___
Leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel



[Leaf-devel] Re: Software write-protect (Was: Re: [leaf-user] Floppies)

2002-06-30 Thread Mike Noyes

On Sun, 2002-06-30 at 05:07, Manfred Schuler wrote:
> I followed the threads on hardware-wp. The last
> information I read was that you have to do some
> SMD soldering to get the write protection feature.
> I think that this is not well suited for many
> people as you need some soldering experience to
> do this.

Manfred,
You are correct on both points.

> The last information i got from apacer is that
> it is possible to write protect the device, but
> they don't sell devices with write protection as
> there are not enough customers to request this 
> feature.

I believe Apacer is talking about the version with the zero ohm resister
build time option enabled on the ATA-Disk Module. I have the standard
version without the build time option. My father and I are going to
attempt post purchase modification of this module to enable
write-protect.

> Also I am a little bit astonished as all people
> on the list agree that any additional level of
> protection is an improvement. But in the discussion
> about software-wp people argument as if it would
> make things worse.

We've lived with hardware write-protection for a long time, and we know
it works. There is usually resistance to change, but it's rarely
insurmountable.

> I still think it is an improvement of security to
> protect the ramdisk and to restrict access to the
> boot device as far as possible. This increases the
> required skills of an intruder and also the chances
> to detect an intruder.
> If you check the mounting options of the ramdisks 
> every second, an intruder has only one second to
> compromise the system and to install and run the
> tools to hide the intrusion.
> 
> The protection can completely be done in a package.
> A few changes (make /var a seperate file system,
> separate mount from busybox) in the base system
> would make things easier and do no harm to the
> system. The user can then decide to use the package
> or not.
> 
> I'm short of free time at the moment, but maybe in
> the next weeks I get the occasion to make a
> beta-version of this package. I will post then the
> information on the list when it is available.

Please do. It's always worthwhile to look at new ideas. Please post your
package information on the devel list when it's ready.


-- 
Mike Noyes <[EMAIL PROTECTED]>
http://sourceforge.net/users/mhnoyes/
http://leaf-project.org/



---
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf

___
Leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel