Re: Location of executable code

2020-05-27 Thread David Sastre
On Tue, May 26, 2020 at 10:43 PM Przemek Klosowski via devel < devel@lists.fedoraproject.org> wrote: > On 5/23/20 12:18 AM, Nico Kadel-Garcia wrote: > > Would the time be better spent enhancing SELinux? > > ThatSELinux already labels everything in /bin and /usr/libexec as > >

Re: Location of executable code

2020-05-26 Thread Przemek Klosowski via devel
On 5/23/20 12:18 AM, Nico Kadel-Garcia wrote: Would the time be better spent enhancing SELinux? ThatSELinux already labels everything in /bin and /usr/libexec as system_u:object_r:bin_t:s0 so maybe it could be leveraged to cover everything you are considering? Is there something

Re: Location of executable code

2020-05-25 Thread Petr Pisar
On Fri, May 22, 2020 at 09:31:25PM -0400, Steve Grubb wrote: > My question now is how can we determine what is meant to be > executable by system applications vs examples and other cruft? (This might be > relevant to people minimizing systems/containers.) Theoretically the examples are a

Re: Location of executable code

2020-05-23 Thread Nicolas Mailhot via devel
Le vendredi 22 mai 2020 à 21:31 -0400, Steve Grubb a écrit : > > Over a couple emails I kind of realized that originally this was > framing the > question wrong. My question now is how can we determine what is meant > to be > executable by system applications vs examples and other cruft?

Re: Location of executable code

2020-05-23 Thread Nicolas Mailhot via devel
Le vendredi 22 mai 2020 à 16:48 -0400, Steve Grubb a écrit : > On Friday, May 22, 2020 4:23:50 PM EDT Przemek Klosowski via devel > wrote: > > > > In general, data is code is data. > > I know this argument well (Weird Machines). I was making the same > argument 10 years ago. :-) It got

Re: Location of executable code

2020-05-23 Thread Nicolas Mailhot via devel
Le vendredi 22 mai 2020 à 20:41 +0200, Nicolas Mailhot via devel a écrit : > > So, no use looking for non-executable /usr/share. A lot of /usr/share > is executable and will stay that way. Also moving executable things somewhere else would make multiarch (more of) a major hassle. Because the

Re: Location of executable code

2020-05-22 Thread Nico Kadel-Garcia
On Fri, May 22, 2020 at 3:20 PM David Malcolm wrote: > Hi Steve > > Your email talks about "application whitelisting" and "executables", > and this thread seems to be getting in to the weeds about things like > the distinction between scripts vs machine code, and modules vs > scripts; code vs

Re: Location of executable code

2020-05-22 Thread Steve Grubb
Hello, On Friday, May 22, 2020 6:38:55 PM EDT Kevin Kofler wrote: > > But what I'm finding in practice is that cinnamon places its javascript > > there, there are libexec dirs that contain executable code, there are > > python and byte compiled python over there. In short, the system doesn't > >

Re: Location of executable code

2020-05-22 Thread Michel Alexandre Salim
On 5/22/20 3:54 PM, Michel Alexandre Salim wrote: On 5/22/20 7:30 AM, Steve Grubb wrote: Hello, I am working on our application whitelisting daemon. It uses the rpmdb to derive trust in what's on disk. If we use the whole rpmdb, then the number of files is large. So, to prune the amount of

Re: Location of executable code

2020-05-22 Thread Michel Alexandre Salim
On 5/22/20 7:30 AM, Steve Grubb wrote: Hello, I am working on our application whitelisting daemon. It uses the rpmdb to derive trust in what's on disk. If we use the whole rpmdb, then the number of files is large. So, to prune the amount of entries in the trust db down to a reasonable number, I

Re: Location of executable code

2020-05-22 Thread Kevin Kofler
Steve Grubb wrote: > But what I'm finding in practice is that cinnamon places its javascript > there, there are libexec dirs that contain executable code, there are > python and byte compiled python over there. In short, the system doesn't > work because critical executables are in /usr/share. >

Re: Location of executable code

2020-05-22 Thread Steve Grubb
On Friday, May 22, 2020 3:19:20 PM EDT David Malcolm wrote: > Your email talks about "application whitelisting" and "executables", > and this thread seems to be getting in to the weeds about things like > the distinction between scripts vs machine code, and modules vs > scripts; code vs data. But

Re: Location of executable code

2020-05-22 Thread Steve Grubb
On Friday, May 22, 2020 4:23:50 PM EDT Przemek Klosowski via devel wrote: > On 5/22/20 1:24 PM, Nico Kadel-Garcia wrote: > > > On Fri, May 22, 2020 at 10:31 AM Steve Grubb wrote: > > > >> I am working on our application whitelisting daemon. > > Interesting concept---could you please elaborate

Re: Location of executable code

2020-05-22 Thread Przemek Klosowski via devel
On 5/22/20 1:24 PM, Nico Kadel-Garcia wrote: On Fri, May 22, 2020 at 10:31 AM Steve Grubb wrote: I am working on our application whitelisting daemon. Interesting concept---could you please elaborate on your design? It sounds useful but also challenging, as Nico points out. On what level

Re: Location of executable code

2020-05-22 Thread Stephen John Smoogen
On Fri, 22 May 2020 at 15:20, David Malcolm wrote: > On Fri, 2020-05-22 at 10:30 -0400, Steve Grubb wrote: > > Hello, > > > > I am working on our application whitelisting daemon. It uses the > > rpmdb to > > derive trust in what's on disk. If we use the whole rpmdb, then the > > number of > >

Re: Location of executable code

2020-05-22 Thread David Malcolm
On Fri, 2020-05-22 at 10:30 -0400, Steve Grubb wrote: > Hello, > > I am working on our application whitelisting daemon. It uses the > rpmdb to > derive trust in what's on disk. If we use the whole rpmdb, then the > number of > files is large. So, to prune the amount of entries in the trust db >

Re: Location of executable code

2020-05-22 Thread Nicolas Mailhot via devel
Le vendredi 22 mai 2020 à 10:30 -0400, Steve Grubb a écrit : > The /usr/share hierarchy is for all read-only architecture > independent data > files. The important part of the FHS definition is “read-only architecture independent“. Because everything on computing storage is data depending on how

Re: Location of executable code

2020-05-22 Thread Florian Weimer
* Petr Viktorin: > Does "read-only architecture independent data" mean the files must not > be programs? Not according to the FHS. From the FHS perspective, /usr/share is just like RPM's noarch architecture: completely portable across all architectures. It can even be machine code if it does

Re: Location of executable code

2020-05-22 Thread Nico Kadel-Garcia
On Fri, May 22, 2020 at 10:31 AM Steve Grubb wrote: > > Hello, > > I am working on our application whitelisting daemon. It uses the rpmdb to > derive trust in what's on disk. If we use the whole rpmdb, then the number of > files is large. So, to prune the amount of entries in the trust db down to

Re: Location of executable code

2020-05-22 Thread Petr Viktorin
On 2020-05-22 17:31, Steve Grubb wrote: On Friday, May 22, 2020 10:39:43 AM EDT Petr Viktorin wrote: On 2020-05-22 16:30, Steve Grubb wrote: Hello, I am working on our application whitelisting daemon. It uses the rpmdb to derive trust in what's on disk. If we use the whole rpmdb, then the

Re: Location of executable code

2020-05-22 Thread Steve Grubb
On Friday, May 22, 2020 10:39:43 AM EDT Petr Viktorin wrote: > On 2020-05-22 16:30, Steve Grubb wrote: > > Hello, > > > > I am working on our application whitelisting daemon. It uses the rpmdb to > > derive trust in what's on disk. If we use the whole rpmdb, then the > > number of files is large.

Re: Location of executable code

2020-05-22 Thread Petr Viktorin
On 2020-05-22 16:30, Steve Grubb wrote: Hello, I am working on our application whitelisting daemon. It uses the rpmdb to derive trust in what's on disk. If we use the whole rpmdb, then the number of files is large. So, to prune the amount of entries in the trust db down to a reasonable number,

Location of executable code

2020-05-22 Thread Steve Grubb
Hello, I am working on our application whitelisting daemon. It uses the rpmdb to derive trust in what's on disk. If we use the whole rpmdb, then the number of files is large. So, to prune the amount of entries in the trust db down to a reasonable number, I thought we could jettison anything in