Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-24 Thread luxxius
Neil Greenwood wrote:

> The vulnerability at the moment doesn't affect any extensions from
> addons.mozilla.org, since they use https to download the update to
> your browser. The problem is with some extensions developed by e.g.
> Google and Yahoo (del.icio.us). Other big companies also are at risk.



Isn't there also an issue - as with all browsers - about 'spyware', 
tracking cookies, and similar?  I use 'No Script', and I have FF set to 
ask before setting cookies;  but I'm not certain that this catches all 
the rubbish.

As I mentioned before, I did have a go at using Nixory - which picked up 
a couple of tracking cookies on first use;  but its spyware database 
does not appear to be getting updated any more.

Can I do anything about browser spyware?  Or am I getting worked up 
about nothing?

--
Diana




-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-23 Thread Neil Greenwood
On 20/06/07, Ian Pascoe <[EMAIL PROTECTED]> wrote:
> Hi Folks
>
> As this has split into two threads, I'm gonna confuse everyone and reply to
> both in one.
>
> Firefox - hasn't there just been a security breach with FF's extensions
> whereby some of them don't conform to using SSL to update so can be duped to
> update from a interposing server?

Hi Ian,

The vulnerability at the moment doesn't affect any extensions from
addons.mozilla.org, since they use https to download the update to
your browser. The problem is with some extensions developed by e.g.
Google and Yahoo (del.icio.us). Other big companies also are at risk.

Basically, any extension hosted at a site with an http URL that
periodically checks the server for an update could be at risk. The
security risk involves changing the user's DNS so that the update URL
points to a different server. Since SSL (https) isn't used in the
update check, there's no way for the browser to verify that it's a
trusted site and it will then merrily download a hacked version of the
extension. Google's extensions even suppress the update message, so
you can't tell that it's been hacked!

Hwyl,
Neil.

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-21 Thread Chris Jones
Hi

Matthew Macdonald-Wallace wrote:
> with SE-Linux, but it looks like it's gonna take a while to master...

Indeed. I'm somewhat doubtful that the PolicyKit chaps can actually
wrangle it into a useful form for a Desktop, at least without
extensively bothering the user for privileges.

I for one am glad we have a top notch security team who respond quickly
enough that we are almost always amongst the first to patch holes :)

Cheers,
-- 
Chris Jones
  [EMAIL PROTECTED]
   www.canonical.com

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-21 Thread Matthew Macdonald-Wallace
Quoting Chris Jones <[EMAIL PROTECTED]>:

> Hi
>
> Matthew Macdonald-Wallace wrote:
>> 2) A link is setup from given directories in each app's jail to
>> /downloads which is read only.
>
> How do I now upload my photos to some website, or any of the other
> myriad things which internet applications want to do that involves
> either reading or writing data locally?
>
> It sounds like a serious mess. Perhaps Fedora's SELinux/PolicyKit stuff
> can do a better job.

Quite probably, I really didn't think it through, it was just a five  
minute distraction from Windows Support really, I'm starting to play  
with SE-Linux, but it looks like it's gonna take a while to master...

M.
-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-21 Thread Chris Jones
Hi

Matthew Macdonald-Wallace wrote:
> 2) A link is setup from given directories in each app's jail to  
> /downloads which is read only.

How do I now upload my photos to some website, or any of the other
myriad things which internet applications want to do that involves
either reading or writing data locally?

It sounds like a serious mess. Perhaps Fedora's SELinux/PolicyKit stuff
can do a better job.

Cheers,
-- 
Chris Jones
  [EMAIL PROTECTED]
   www.canonical.com

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-21 Thread Chris Jones
Hi

Scrase, Eddie wrote:
> Firefox should only install an extension without warning if the site is on
> it's trusted list, which defaults to just mozilla.org.  Obviously this
> assumes that the attackers haven't hacked into Mozilla's site...

Firefox will only install an extension from a trusted site. Period. It
will also always display a dialog which requests confirmation from the
user to install the extension and the "Install" button will always be
inactive for about 5 seconds.

Clicking on an XPI link from an untrusted site will produce an error
telling the user that the operation was blocked. They can then add the
site as trusted in order to continue (although of course they can save
the XPI locally and install it from there).

It should *never* *ever* *ever* install an extension without a warning.

Cheers,
-- 
Chris Jones
  [EMAIL PROTECTED]
   www.canonical.com

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Ian Pascoe
Hi Folks

As this has split into two threads, I'm gonna confuse everyone and reply to
both in one.

Firefox - hasn't there just been a security breach with FF's extensions
whereby some of them don't conform to using SSL to update so can be duped to
update from a interposing server?

Running FF securely - isn't the idea of running FF under a seperate usre
basically what the kernal peeps are trying to do with their 'Containers'
proposals?  I admit that like chris R, it seems like a good idea to pursue
for that "just in case" feeling, but it's a pain if you want to do something
and just need to Google it..

E

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of luxxius
Sent: 20 June 2007 17:58
To: British Ubuntu Talk
Subject: Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please


alan c wrote:
> With Ubuntu in mind I would be grateful for more information about the
> possible vulnerability - or not - of the sort of malware (trojan)
> which is likely to be used in the sort of current, and on a new scale,
> attack via infected websites as described in the Guardian:
>
> http://www.guardian.co.uk/international/story/0,,2106855,00.html
>
> My initial reaction is of course that linux doe snot install anything
> without a password, but then I remembered that in my user activities I
> was able to install a firefox extension without a password (I think),
> and in principle  I can install into my user area with no password
> generally.
>
> So could a trojan be installed easily from an infected website without
> my knowledge?


Wasn't Nixory intended to deal with malware affecting Linux web
browsers?  But there no longer seem to be any updates to Nixory.

Anyone know what's happened to this project?

--
Diana


--
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/



-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread luxxius
alan c wrote:
> With Ubuntu in mind I would be grateful for more information about the 
> possible vulnerability - or not - of the sort of malware (trojan) 
> which is likely to be used in the sort of current, and on a new scale, 
> attack via infected websites as described in the Guardian:
> 
> http://www.guardian.co.uk/international/story/0,,2106855,00.html
> 
> My initial reaction is of course that linux doe snot install anything 
> without a password, but then I remembered that in my user activities I 
> was able to install a firefox extension without a password (I think), 
> and in principle  I can install into my user area with no password 
> generally.
> 
> So could a trojan be installed easily from an infected website without 
> my knowledge?


Wasn't Nixory intended to deal with malware affecting Linux web 
browsers?  But there no longer seem to be any updates to Nixory.

Anyone know what's happened to this project?

--
Diana


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Robert McWilliam
On Wed, 20 Jun 2007 17:08:49 +0100
alan c <[EMAIL PROTECTED]> wrote: 
> Interesting. Any idea if other apps have a trusted list also, and 
> where such list/s may be located (and firefox's)?

For firefox's trusted list look in the security tab of the preferences
dialogue, there is a checkbox there with "Warn me when sites try to
install add-ons" and an "Exceptions" button. Clicking the "Exceptions"
button brings up the list of trusted sites. 


Robert McWilliam [EMAIL PROTECTED]www.ormiret.com

There are very few personal problems that cannot be solved through a
suitable application of high explosives.

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread alan c
Scrase, Eddie wrote:
>> My initial reaction is of course that linux doe snot install anything 
>> without a password, but then I remembered that in my user activities I 
>> was able to install a firefox extension without a password (I think), 
>> and in principle  I can install into my user area with no password 
>> generally.
> 
> Firefox should only install an extension without warning if the site is on
> it's trusted list, which defaults to just mozilla.org.  Obviously this
> assumes that the attackers haven't hacked into Mozilla's site...

Interesting. Any idea if other apps have a trusted list also, and 
where such list/s may be located (and firefox's)?
-- 
alan cocks
Kubuntu user#10391

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Quoting Lucy <[EMAIL PROTECTED]>:

> On 20/06/07, Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
>> I was under the impression that if you run an app
>> in a chroot jail, the libraries are available to it?
>>
> I believe that you need to provide a copy of any libraries under the
> chroot jail too (a quick Google seems to back this up).

I stand corrected! ;o)

M.
-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Lucy
On 20/06/07, Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
> I was under the impression that if you run an app
> in a chroot jail, the libraries are available to it?
>
I believe that you need to provide a copy of any libraries under the
chroot jail too (a quick Google seems to back this up).

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Quoting Lucy <[EMAIL PROTECTED]>:

> On 20/06/07, Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
>> > In principle though yes, it would be nice if each app that faces an
>> > untrusted network was in their own separate user space or jail.
>>
>> OK then, why not something like this:
>>
>> 1) App is installed into it's own Jail
>> 2) A link is setup from given directories in each app's jail to
>> /downloads which is read only.
>> 3) Any documents downloaded are saved to the dir in the jail, but can
>> be access by any user via /downloads and copied from there to a home
>> dir.
>> 4) a cron job runs once a day and cleans out any files that are still
>> in /downloads for security purposes.
>>
>
> Each application would still need access to system libraries, etc
> though and so would still be a security risk to some extent. You could
> look at SELinux, used by Fedora, which AFAIK uses policies to restrict
> what an application can do and where it can write to.

Point taken, however I was under the impression that if you run an app  
in a chroot jail, the libraries are available to it?

Again, I could be wrong about this as well! :)

M.
-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Lucy
On 20/06/07, Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
> > In principle though yes, it would be nice if each app that faces an
> > untrusted network was in their own separate user space or jail.
>
> OK then, why not something like this:
>
> 1) App is installed into it's own Jail
> 2) A link is setup from given directories in each app's jail to
> /downloads which is read only.
> 3) Any documents downloaded are saved to the dir in the jail, but can
> be access by any user via /downloads and copied from there to a home
> dir.
> 4) a cron job runs once a day and cleans out any files that are still
> in /downloads for security purposes.
>

Each application would still need access to system libraries, etc
though and so would still be a security risk to some extent. You could
look at SELinux, used by Fedora, which AFAIK uses policies to restrict
what an application can do and where it can write to.

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Scrase, Eddie
> My initial reaction is of course that linux doe snot install anything 
> without a password, but then I remembered that in my user activities I 
> was able to install a firefox extension without a password (I think), 
> and in principle  I can install into my user area with no password 
> generally.

Firefox should only install an extension without warning if the site is on
it's trusted list, which defaults to just mozilla.org.  Obviously this
assumes that the attackers haven't hacked into Mozilla's site...
-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Lee Tambiah

Quoting alan c <[EMAIL PROTECTED]>:

So all in all, viruses[0] and their ilk will come to linux as it
becomes more and more popular, however there will alwys be the fact
that Linux is inherently more secure than some of the alternatives out
there to give you a warm, fuzzy feeling... :o)



I'm not so sure of this statement, we must remember that most servers around
organisations are GNU/Linux based, but fail to get hosed by viruses. It is a
fact in my opnion that Windows is less secure as I have used both systems to
compare. General users on Win32 are constantly plagued by viruses and
spyware which GNU/Linux does not seem to be affected by. I also read an
article not so long ago about a cracker who got caught breaking into the
Pentagon systems. Funny thing was he mentioned that his first point of
action would be to look for Windows machines as they are generally easier to
exploit.

This article will explain the theory behind the Windows and Linux systems

http://www.theregister.co.uk/security/security_report_windows_vs_linux/

Cheers

Lee
-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Quoting Robert McWilliam <[EMAIL PROTECTED]>:

> On Wed, 20 Jun 2007 13:48:11 +0100
> Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
>> Yeah, it will.  There's no need to run xhost -local before running
>> gksudo, this will lcok the system out (as demonstrated effectively
>> above!)
>
> I was running -local: to remove the +local: I did earlier. To check and
> see if the default settings were enough to run it without the "xhost
> +local:" I just created a whole new user and tried "gksudo -u st
> firefox" and it failed with the same error as I quoted above.

Hmmm, then again, I could be wrong... :o)

M.
-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Quoting Kris Marsh <[EMAIL PROTECTED]>:

> On 6/20/07, Chris Rowson <[EMAIL PROTECTED]> wrote:
>> This topic makes me think though.
>>
>> Wouldn't isolating all net enabled applications in this manner pretty
>> much secure linux? Why aren't distributions running like this as
>> standard?
>>
>> Chris
>>
>> --
>> ubuntu-uk@lists.ubuntu.com
>> https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
>> https://wiki.kubuntu.org/UKTeam/
>>
>
>
> Security vs Usability.
>
> If you run your browser under a separate user you wont, for example,
> be able to save files to your home directory.
>
> In principle though yes, it would be nice if each app that faces an
> untrusted network was in their own separate user space or jail.

OK then, why not something like this:

1) App is installed into it's own Jail
2) A link is setup from given directories in each app's jail to  
/downloads which is read only.
3) Any documents downloaded are saved to the dir in the jail, but can  
be access by any user via /downloads and copied from there to a home  
dir.
4) a cron job runs once a day and cleans out any files that are still  
in /downloads for security purposes.

Just a thought,

M.



-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Robert McWilliam
On Wed, 20 Jun 2007 13:48:11 +0100
Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
> Yeah, it will.  There's no need to run xhost -local before running  
> gksudo, this will lcok the system out (as demonstrated effectively  
> above!)

I was running -local: to remove the +local: I did earlier. To check and
see if the default settings were enough to run it without the "xhost
+local:" I just created a whole new user and tried "gksudo -u st
firefox" and it failed with the same error as I quoted above. 


Robert McWilliam [EMAIL PROTECTED]www.ormiret.com

Education is what you get from reading the small print. Experience is
what you get from not reading it.

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Kris Marsh
On 6/20/07, Chris Rowson <[EMAIL PROTECTED]> wrote:
> This topic makes me think though.
>
> Wouldn't isolating all net enabled applications in this manner pretty
> much secure linux? Why aren't distributions running like this as
> standard?
>
> Chris
>
> --
> ubuntu-uk@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
> https://wiki.kubuntu.org/UKTeam/
>


Security vs Usability.

If you run your browser under a separate user you wont, for example,
be able to save files to your home directory.

In principle though yes, it would be nice if each app that faces an
untrusted network was in their own separate user space or jail.


Kris

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Chris Rowson
This topic makes me think though.

Wouldn't isolating all net enabled applications in this manner pretty
much secure linux? Why aren't distributions running like this as
standard?

Chris

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Quoting Robert McWilliam <[EMAIL PROTECTED]>:

> On Wed, 20 Jun 2007 13:24:55 +0100
> Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
>> Quoting Robert McWilliam <[EMAIL PROTECTED]>:
>> >xhost +local:
>>
>> In theory, you shouldn't need to do even this, the gksudo command
>> should work without needing to open up X to local connections.
>
> Doesn't work here:
>
> [EMAIL PROTECTED]:~$ xhost -local:
> non-network local connections being removed from access control list
> [EMAIL PROTECTED]:~$ gksudo -u st firefox
> Xlib: No protocol specified
>
>
> (firefox-bin:26170): Gtk-WARNING **: cannot open display:
> [EMAIL PROTECTED]:~$ xhost +local:
> non-network local connections being added to access control list
> [EMAIL PROTECTED]:~$ gksudo -u st firefox
> [EMAIL PROTECTED]:~$
>
> firefox started the second time.

Yeah, it will.  There's no need to run xhost -local before running  
gksudo, this will lcok the system out (as demonstrated effectively  
above!)

M.
-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Robert McWilliam
On Wed, 20 Jun 2007 13:24:55 +0100
Matthew Macdonald-Wallace <[EMAIL PROTECTED]> wrote:
> Quoting Robert McWilliam <[EMAIL PROTECTED]>:
> > xhost +local:
> 
> In theory, you shouldn't need to do even this, the gksudo command  
> should work without needing to open up X to local connections.

Doesn't work here:

[EMAIL PROTECTED]:~$ xhost -local:
non-network local connections being removed from access control list
[EMAIL PROTECTED]:~$ gksudo -u st firefox
Xlib: No protocol specified


(firefox-bin:26170): Gtk-WARNING **: cannot open display:  
[EMAIL PROTECTED]:~$ xhost +local:
non-network local connections being added to access control list
[EMAIL PROTECTED]:~$ gksudo -u st firefox
[EMAIL PROTECTED]:~$ 

firefox started the second time.



Robert McWilliam [EMAIL PROTECTED]www.ormiret.com

1 in 4 vets have treated drunk dogs.

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Quoting Robert McWilliam <[EMAIL PROTECTED]>:

> On Wed, 20 Jun 2007 12:48:58 +0100
> alan c <[EMAIL PROTECTED]> wrote:
>> Would there be a procedure to use browser/s with a different 'user'
>> password, with much lower privileges than the normal user, so that
>> when browsing the 'user-low' being used is not allowed to download
>> anything knowingly or not (without password)? Accepted that the the
>> user-low is still using a browser which may have weaknesses.
>>
>
> Yes. I just found this procedure by playing around so there may be a
> better one.
>
> First you need to have another user to run firefox as, and you need to
> tell the xserver that local users can connect to it (not just the user
> who owns it) with:
>   xhost +local:

In theory, you shouldn't need to do even this, the gksudo command  
should work without needing to open up X to local connections.

M.
-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Robert McWilliam
On Wed, 20 Jun 2007 12:48:58 +0100
alan c <[EMAIL PROTECTED]> wrote:
> Would there be a procedure to use browser/s with a different 'user'
> password, with much lower privileges than the normal user, so that
> when browsing the 'user-low' being used is not allowed to download
> anything knowingly or not (without password)? Accepted that the the
> user-low is still using a browser which may have weaknesses.
> 

Yes. I just found this procedure by playing around so there may be a
better one. 

First you need to have another user to run firefox as, and you need to
tell the xserver that local users can connect to it (not just the user
who owns it) with:
xhost +local:

then you can start firefox as another user with:
gksudo -u browser firefox

where browser should be replaced with the user you created for
browsing. 

You can play with what the new user is allowed to do to limit the
damage that taking over firefox can do.

The same procedure can be used to run any app with reduced or escalated
privileges.


Robert McWilliam [EMAIL PROTECTED]www.ormiret.com

Common sense is the collection of prejudices acquired by age 18.
-- Albert Einstein

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Quoting alan c <[EMAIL PROTECTED]>:
> Thanks, much appreciated.
>
> Would there be a procedure to use browser/s with a different 'user'
> password, with much lower privileges than the normal user, so that
> when browsing the 'user-low' being used is not allowed to download
> anything knowingly or not (without password)? Accepted that the the
> user-low is still using a browser which may have weaknesses.

In theory, you could setup a new user and group that has permissions  
from /etc/sudoers to only run firefox.

You could then setup a shortcut on your desktop to make firefox run  
using gksudo as this new user, although for the time being I really  
don't think its something to worry about too much.

M.
-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread alan c
Matthew Macdonald-Wallace wrote:
> Alan,
> 
> Quoting alan c <[EMAIL PROTECTED]>:
> 
>> With Ubuntu in mind I would be grateful for more information
>> about the possible vulnerability - or not - of the sort of
>> malware (trojan) which is likely to be used in the sort of
>> current, and on a new scale, attack via infected websites as
>> described in the Guardian:
>> 
>> http://www.guardian.co.uk/international/story/0,,2106855,00.html
>> 
>> My initial reaction is of course that linux doe snot install
>> anything without a password, but then I remembered that in my
>> user activities I was able to install a firefox extension without
>> a password (I think), and in principle  I can install into my
>> user area with no password generally.
>> 
>> So could a trojan be installed easily from an infected website
>> without my knowledge?
> 
> The answer is that at some point, there will be a vulnerability in
>  Firefox or any other open-source web browser that allows for this
> kind of content to download itself onto your computer.
> 
> This could be a keylogger which then emails logfiles to an irc-chat
>  room somewhere for _your user_, however it would not be able to
> run as root unless you let it or it was working in conjunction with
> other exploits that allowed unauthorised access to your system.
> 
> The good news is that the chances of this is rare for the following
> reasons:
> 
> 1) Generally, a completely different set of code instructions would
>  need to be compiled for the program to run under linux 2) As the
> vast majority of people use Windows, crackers are less likely to
> write a trojan for Linux-based machines (although this could change
> in time) 3) The chances of getting the exact two vulnerabilities
> that the torjan/bug is written to exploit are pretty remote
> 
> So all in all, viruses[0] and their ilk will come to linux as it 
> becomes more and more popular, however there will alwys be the fact
>  that Linux is inherently more secure than some of the alternatives
> out there to give you a warm, fuzzy feeling... :o)
> 
> HTH,
> 
> M. [0] and it is Viruses, not Virii as I had though for years!

Thanks, much appreciated.

Would there be a procedure to use browser/s with a different 'user'
password, with much lower privileges than the normal user, so that
when browsing the 'user-low' being used is not allowed to download
anything knowingly or not (without password)? Accepted that the the
user-low is still using a browser which may have weaknesses.

-- 
alan cocks
Kubuntu user#10391

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/


Re: [ubuntu-uk] Ubuntu (linux) vulnerabilty?? Comment please

2007-06-20 Thread Matthew Macdonald-Wallace
Alan,

Quoting alan c <[EMAIL PROTECTED]>:

> With Ubuntu in mind I would be grateful for more information about the
> possible vulnerability - or not - of the sort of malware (trojan)
> which is likely to be used in the sort of current, and on a new scale,
> attack via infected websites as described in the Guardian:
>
> http://www.guardian.co.uk/international/story/0,,2106855,00.html
>
> My initial reaction is of course that linux doe snot install anything
> without a password, but then I remembered that in my user activities I
> was able to install a firefox extension without a password (I think),
> and in principle  I can install into my user area with no password
> generally.
>
> So could a trojan be installed easily from an infected website without
> my knowledge?

The answer is that at some point, there will be a vulnerability in  
Firefox or any other open-source web browser that allows for this kind  
of content to download itself onto your computer.

This could be a keylogger which then emails logfiles to an irc-chat  
room somewhere for _your user_, however it would not be able to run as  
root unless you let it or it was working in conjunction with other  
exploits that allowed unauthorised access to your system.

The good news is that the chances of this is rare for the following reasons:

1) Generally, a completely different set of code instructions would  
need to be compiled for the program to run under linux
2) As the vast majority of people use Windows, crackers are less  
likely to write a trojan for Linux-based machines (although this could  
change in time)
3) The chances of getting the exact two vulnerabilities that the  
torjan/bug is written to exploit are pretty remote

So all in all, viruses[0] and their ilk will come to linux as it  
becomes more and more popular, however there will alwys be the fact  
that Linux is inherently more secure than some of the alternatives out  
there to give you a warm, fuzzy feeling... :o)

HTH,

M.
[0] and it is Viruses, not Virii as I had though for years!


-- 
Matthew Macdonald-Wallace
Group Co-Ordinator
Thanet Linux User Group
http://www.thanet.lug.org.uk/
[EMAIL PROTECTED]
GPG KEY: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xFEA1BC16


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/