Re: Wine securityflaw.

2002-11-01 Thread Geoff Thorpe
On Friday 01 Nov 2002 11:51 am, Vincent Béron wrote: > Le ven 01/11/2002 à 11:27, Geoff Thorpe a écrit : > > Hi there, > > [snip] > > > > What do you mean? No PE apps can link straight to glibc. Only > > > Unix-implemented DLLs (like the Wine ones) can link to it. The > > > problem > > > > Ah, this

Re: Wine securityflaw.

2002-11-01 Thread Vincent Béron
Le ven 01/11/2002 à 11:27, Geoff Thorpe a écrit : > Hi there, > [snip] > > What do you mean? No PE apps can link straight to glibc. Only > > Unix-implemented DLLs (like the Wine ones) can link to it. The problem > > Ah, this had been my question. It seemed otherwise from the earlier post > I had

Re: Wine securityflaw.

2002-11-01 Thread Geoff Thorpe
Hi there, On Friday 01 Nov 2002 8:23 am, Ove Kaaven wrote: > On Thu, 31 Oct 2002, Geoff Thorpe wrote: > > However, that still *requires* that the wineserver is actually doing > > all the work and the wine processes that load and link PE images are > > doing very little except marshalling the win32

Re: Wine securityflaw.

2002-11-01 Thread Ove Kaaven
On Thu, 31 Oct 2002, Geoff Thorpe wrote: > However, that still *requires* that the wineserver is actually doing all > the work and the wine processes that load and link PE images are doing > very little except marshalling the win32 API back and forth to the > wineserver. I'm not convinced that's

Re: Wine securityflaw.

2002-10-31 Thread Geoff Thorpe
Hi there, On Thursday 31 Oct 2002 2:21 pm, David Fraser wrote: > I think this is missing the point. No, I think you're stuck on a point that wine is simply destined (ie. as in "fate") to miss on both our behalves. I'm talking about a different point where some useful headway could be made. > The

Re: Wine securityflaw.

2002-10-31 Thread Raul Dias
Greg Turner <[EMAIL PROTECTED]> wrote: >On Thursday 31 October 2002 08:10 am, Raul Dias wrote: >> My $0.02, >> >> A way to make it more secure is to catch key API calls and decide if >> the application is allowed to run it or not. > >not a bad idea. > >> Wine could implement a clean Security Layer:

Re: Wine securityflaw.

2002-10-31 Thread David Fraser
Geoff Thorpe wrote: On Thursday 31 Oct 2002 10:00 am, Greg Turner wrote: On Thursday 31 October 2002 08:10 am, Raul Dias wrote: My $0.02, A way to make it more secure is to catch key API calls and decide if the application is allowed to run it or not. not a bad idea. Wine co

Re: Wine securityflaw.

2002-10-31 Thread Geoff Thorpe
On Thursday 31 Oct 2002 10:00 am, Greg Turner wrote: > On Thursday 31 October 2002 08:10 am, Raul Dias wrote: > > My $0.02, > > > > A way to make it more secure is to catch key API calls and decide if > > the application is allowed to run it or not. > > not a bad idea. > > > Wine could implement a

Re: Wine securityflaw.

2002-10-31 Thread Vincent Béron
Marcus Meissner wrote: On Thu, Oct 31, 2002 at 11:10:33AM -0300, Raul Dias wrote: My $0.02, I always though of a wine as way to run windows apps better than windows. Better also means "more secure" for me. A way to make it more secure is to catch key API calls and decide if the application i

Re: Wine securityflaw.

2002-10-31 Thread Marcus Meissner
On Thu, Oct 31, 2002 at 11:10:33AM -0300, Raul Dias wrote: > My $0.02, > > I always though of a wine as way to run windows apps > better than windows. > > Better also means "more secure" for me. > > A way to make it more secure is to catch key API calls and decide if > the application is allowe

Re: Wine securityflaw.

2002-10-31 Thread Greg Turner
On Thursday 31 October 2002 08:10 am, Raul Dias wrote: > My $0.02, > > A way to make it more secure is to catch key API calls and decide if > the application is allowed to run it or not. not a bad idea. > Wine could implement a clean Security Layer: YES Clean, perhaps, but secure? That depends

Re: Wine securityflaw.

2002-10-31 Thread Raul Dias
My $0.02, I always though of a wine as way to run windows apps better than windows. Better also means "more secure" for me. A way to make it more secure is to catch key API calls and decide if the application is allowed to run it or not. This would be easy to detect if an application is trying

Re: Wine securityflaw.

2002-10-28 Thread Francois Gouget
On Mon, 28 Oct 2002, Francois Gouget wrote: > On Sun, 27 Oct 2002, Peter Andersson wrote: > [...] > > I agree. Using chroot could offer the functionality Im looking for. > > I also saw this today on kernel-traffic. It looks pretty much like what > you are looking for: > > * Linux Security Protect

Re: Wine securityflaw.

2002-10-28 Thread Francois Gouget
On Sun, 27 Oct 2002, Peter Andersson wrote: [...] > I agree. Using chroot could offer the functionality Im looking for. I also saw this today on kernel-traffic. It looks pretty much like what you are looking for: * Linux Security Protection System http://www.uwsg.indiana.edu/hypermail/linux/k

Re: Wine securityflaw.

2002-10-27 Thread Peter Andersson
On Sunday 27 October 2002 22.19, Francois Gouget wrote: > On Sun, 27 Oct 2002, Peter Andersson wrote: > > What is it with you people? > > I was just trying to make a point about the security risks about using > > wine at present. And you start flameing me? > > We're not flaming you. We're just see

Re: Wine securityflaw: Protect against root

2002-10-27 Thread Francois Gouget
On Sun, 27 Oct 2002, David D. Hagood wrote: > P. Christeas wrote: > > > > > Write a segment of code that will abort wine, if it is run as root > > (that is, > > just before wine starts anything). This piece of code should only be > > explicitly disabled in the 'configure' script. That way, only a

Re: Wine securityflaw.

2002-10-27 Thread Francois Gouget
On Sun, 27 Oct 2002, Peter Andersson wrote: > What is it with you people? > I was just trying to make a point about the security risks about using wine > at present. And you start flameing me? We're not flaming you. We're just see big flaws with your proposal. We also proposed alternatives that

Re: Wine securityflaw: Protect against root

2002-10-27 Thread Eric Pouech
> Also, I stated that the command line parameter to wine would be required > to even start the process - in other words, if you didn't supply it, you > would not get the dialog, wine would just terminate. > > AND, this would not necessarily have to be bloat in wine, it could be > handled by a defa

Re: Wine securityflaw: Protect against root

2002-10-27 Thread Andreas Mohr
On Sun, Oct 27, 2002 at 07:51:01AM -0600, David D. Hagood wrote: > I would ALSO suggest that wine check the execute bit on the application > being run - the recent incident with Klez running under Wine would not > have happened (I think) if wine would not run that which is not marked > with the

Re: Wine securityflaw: Protect against root

2002-10-27 Thread David D. Hagood
Eric Pouech wrote: does rm have such an option ? rm doesn't, so I don't see any reason for Actually, rm DOES have such an option: -i, --interactive prompt before any removal AND certain distros (RedHat for example) alias rm to "rm -i" by default. Also, I stated that the com

Re: Wine securityflaw.

2002-10-27 Thread Dimitrie O. Paun
On October 27, 2002 06:37 am, Peter Andersson wrote: > My idea is to use ptrace in a supervisor process to trap all syscalls from > the wine process, and use some kind of sanity checks for some of the > syscalls. Watching the fork,exec,open,write and unlink syscalls and doing > sanity checks could

Re: Wine securityflaw: Protect against root

2002-10-27 Thread Shachar Shemesh
Excuse me, but I don't think that any of these proposed methods will live up to any real malicious code. Personally, I believe we should make wine: A. Not require root B. As secure on it's own as possible (i.e. - not open to any problems not introduced by the hosted program). These two should a

Re: Wine securityflaw: Protect against root

2002-10-27 Thread Eric Pouech
> I slightly disagree - I think the thing to do would be to have wine not > run if UID == 0, UNLESS the commandline parameter --i-know-i-am-root is > set, AND THEN pop up a dialog box that requires confirmation before > continuing. does rm have such an option ? rm doesn't, so I don't see any reason

Re: Wine securityflaw: Protect against root

2002-10-27 Thread David D. Hagood
P. Christeas wrote: Write a segment of code that will abort wine, if it is run as root (that is, just before wine starts anything). This piece of code should only be explicitly disabled in the 'configure' script. That way, only a I slightly disagree - I think the thing to do would be to have

Re: Wine securityflaw: Protect against root

2002-10-27 Thread P. Christeas
> Peter Andersson <[EMAIL PROTECTED]> writes: > > The question is...Would you expect that damage from running a windows app > > in wine, when you know it could be safely run in Windows? > > In just a few embedded bytes in the code it could remove your home > > directory in a single syscall. Would y

Re: Wine securityflaw.

2002-10-27 Thread Matthew Bloch
On Sunday 27 October 2002 11:37, Peter Andersson wrote: > What is it with you people? > I was just trying to make a point about the security risks about using wine > at present. And you start flameing me? I don't see any flames, just strong criticism of your idea for which you may not have thoug

Re: Wine securityflaw.

2002-10-27 Thread Johan Gill
On Sun, 27 Oct 2002, Peter Andersson wrote: > What is it with you people? > I was just trying to make a point about the security risks about using wine > at present. And you start flameing me? > Instead of continuing this flame war I will try to express myself more > clearly. You call that a fla

Re: Wine securityflaw.

2002-10-27 Thread Peter Andersson
What is it with you people? I was just trying to make a point about the security risks about using wine at present. And you start flameing me? Instead of continuing this flame war I will try to express myself more clearly. Before I go into details of my idea, lets make a few things clear... I a

Re: Wine securityflaw.

2002-10-27 Thread Greg Turner
On Saturday 26 October 2002 11:43 pm, Francois Gouget wrote: > On Sat, 26 Oct 2002, Greg Turner wrote: > > That is, wine "emulates" an OS with no security measures at the > > filesystem level, no security policy regarding what API's can be called > > (except as provided by the CPU itself), and so o

Re: Wine securityflaw.

2002-10-26 Thread Francois Gouget
On Sat, 26 Oct 2002, Greg Turner wrote: [...warning: slight reordering...] > I think the problem is one of wine being closely associated with Windows, > and windows having a reputation of being insecure; in other words, it's a problem > of perception, not of technical merit. Nothing wrong with tha

Re: Wine securityflaw.

2002-10-26 Thread Greg Turner
On Saturday 26 October 2002 08:32 pm, Vincent Béron wrote: > Peter Andersson a écrit: > > Malicious Linux/Unix syscalls could be embedded > > in windows apps and if executed do a great deal of damage. > > And don't forget that if you try to build a wall in an open field, there > will probably be s

Re: Wine securityflaw.

2002-10-26 Thread Alexandre Julliard
Peter Andersson <[EMAIL PROTECTED]> writes: > The question is...Would you expect that damage from running a windows app > in wine, when you know it could be safely run in Windows? > In just a few embedded bytes in the code it could remove your home directory > in a single syscall. Would you expec

Re: Wine securityflaw.

2002-10-26 Thread Francois Gouget
On Sun, 27 Oct 2002, Peter Andersson wrote: [...] > I believe most wine users trust wine not to touch anything outside of > its configured drive space. Malicious Linux/Unix syscalls could be embedded > in windows apps and if executed do a great deal of damage. After all checking > your app is run

Re: Wine securityflaw.

2002-10-26 Thread Vincent Béron
Peter Andersson a écrit: Hello again, (FYI, I took the liberty to change the topic since I started the former thread "How is Win/Dos syscalls implemented in Wine?" which I feel has gone a little bit off-topic) I had some more thoughts on the issue... I believe most wine users trust wine not

Wine securityflaw.

2002-10-26 Thread Peter Andersson
Hello again, (FYI, I took the liberty to change the topic since I started the former thread "How is Win/Dos syscalls implemented in Wine?" which I feel has gone a little bit off-topic) I had some more thoughts on the issue... I believe most wine users trust wine not to touch anything outside