On Wed, Feb 17, 2021 at 08:22:27PM +0000, Stuart Henderson wrote: > On 2021/02/17 19:42, Marc Espie wrote: > > On Wed, Feb 17, 2021 at 02:48:02PM +0000, Stuart Henderson wrote: > > > On 2021/02/05 10:07, Marc Espie wrote: > > > > As the idiot responsible for how the framework actually works, I'm > > > > always > > > > running with keepenv. > > > > > > > > Building ports by hand always end up installing *whatever* as root, so > > > > I don't see nopass as much of a security risk either. Heck, you're > > > > going to > > > > put that shit in /usr/local/bin and run it anyway. > > > > > > > > > > > > PORTS_PRIVSEP is a much better security measure. Preventing ports from > > > > accidentally accessing the network or writing all over the system is > > > > good. > > > > > > Coming back to this because I thought of something.. > > > > > > Note I am only thinking about the case with PORTS_PRIVSEP, I think anybody > > > working with ports should use that by default, it's not that hard to > > > work with. > > > > > > The place where nopass is a problem is elevating from your normal user > > > account. But this is exactly the place where people are getting fed up > > > with entering their password many times which is exactly why they're > > > wanting to use nopass. > > > > > > There is a possible change that could be made to make this much safer > > > (though doas is already above the proposed limit of 1000 lines of code ;) > > > It could have another mode, similar to "nopass" but which, instead of > > > running the elevated commands directly, prints the command line and asks > > > for yes/no confirmation. This would save entering passwords all the time > > > but would make it much harder to just sneak an elevated command past the > > > person in front of the keyboard. > > > > > > It seems so obvious, I'm wondering why doas or sudo before doesn't > > > already have it.. > > > > > > > > I'm not very sure how useful it would be for ports, considering the > > actual commands we get to run as root, which aren't exactly short with all > > the options... > > > > I'm not thinking about stuff run from ports infrastructure here. > > The connection with ports is that people use nopass to stop being asked to > type the password 3 times every time infrastructure tries to install a > dependency (doas persist "tickets" can't be transferred sideways or > downwards to other processes). So it's easy to see why they might use > nopass, but that opens themselves up to attacks from other angles.
Ah right, makes way more sense in that case. Is tedu@ AWOL or still somewhat around ?