Re: Limiting the power of packages

2018-12-07 Thread Enrico Weigelt, metux IT consult
On 19.11.18 20:24, gregor herrmann wrote: > On Mon, 19 Nov 2018 17:29:37 +0100, Enrico Weigelt, metux IT consult wrote: > > (OT, but since I noticed it too:) > >> Anyways, Skype doesn't work since 8.30 as it crashes directly on >> startup. > > Apparently it needs (e)logind since that version. T

Re: Limiting the power of packages

2018-11-19 Thread gregor herrmann
On Mon, 19 Nov 2018 17:29:37 +0100, Enrico Weigelt, metux IT consult wrote: (OT, but since I noticed it too:) > Anyways, Skype doesn't work since 8.30 as it crashes directly on > startup. Apparently it needs (e)logind since that version. Cheers, gregor -- .''`. https://info.comodo.priv.at

Re: Limiting the power of packages

2018-11-19 Thread Enrico Weigelt, metux IT consult
On 07.10.18 21:20, Adrian Bunk wrote: > For leaf software like Skype or Chrome, approaches like flatpak where> > software can be installed by non-root users and then runs confined> have a more realistic chance of being able to becoming a good solution. I'd rather put those non-trustworthy code th

Re: Limiting the power of packages

2018-10-08 Thread Jonathan Dowland
On Sun, Oct 07, 2018 at 01:06:54PM +0200, Tomas Pospisek wrote: I think Linux systems per se, Debian as a runtime, the (social) processes required from DDs/DMs, the whole technical Debian packaging ecosystem are each plenty complex enough already. … they IMHO should serve as a dimension to meas

Re: Limiting the power of packages

2018-10-07 Thread Adrian Bunk
On Wed, Oct 03, 2018 at 08:19:17PM +0300, Lars Wirzenius wrote: >... > A suggestion: we restrict where packages can install files and what > maintainer scripts can do. The default should be as safe as we can > make it, and packages that need to do things not allowed by the > default should declare

Re: Limiting the power of packages

2018-10-07 Thread Tomas Pospisek
On 3 Oct 2018 Lars Wirzenius wrote: > A suggestion: we restrict where packages can install files and what maintainer scripts can do. On 4 Oct 2018 Enrico Weigelt wrote: > Finally, I'd really like to reduce complexity, not introduce even more. +1 I think Linux systems per se, Debian as a runtim

Re: Limiting the power of packages

2018-10-05 Thread David Bremner
Laurent Bigonville writes: > Lars Wirzenius wrote: > >> * default: install files in /usr only >> * kernel: install files in /boot, trigger initramfs >> * core: can install files anywhere, trigger anything >> * maintained-by-liw: full power to do anything >> >> This might be implemented in various

Re: Limiting the power of packages

2018-10-05 Thread Laurent Bigonville
Lars Wirzenius wrote: * default: install files in /usr only * kernel: install files in /boot, trigger initramfs * core: can install files anywhere, trigger anything * maintained-by-liw: full power to do anything This might be implemented in various ways. For example, dpkg could create a tempora

Re: Limiting the power of packages

2018-10-05 Thread Thomas Goirand
On 10/4/18 12:23 PM, Jonathan Dowland wrote: > On Thu, Oct 04, 2018 at 12:09:05PM +0200, Thomas Goirand wrote: >> And prevent stuff like with the bumblebee uninstall disaster because of >> an added space, for example: >> >> rm -rf /usr /share/foo/bar.conf > > Yes, or the similar bug in steam-for-l

Re: Limiting the power of packages

2018-10-04 Thread Paul Wise
On Fri, Oct 5, 2018 at 3:20 AM Simon Richter wrote: > We could bring the same to dpkg by moving things out of maintainer scripts > and into control files. The big items would be > > - alternatives > - diversions > - statoverride > - service start/stop The dpkg maintainers have this on their r

Re: Limiting the power of packages

2018-10-04 Thread W. Martin Borgert
On 2018-10-04 21:10, Simon Richter wrote: > We could bring the same to dpkg by moving things out of maintainer scripts > and into control files. The big items would be > > - alternatives > - diversions > - statoverride > - service start/stop I agree and like to add: - create system users/gro

Re: Limiting the power of packages

2018-10-04 Thread Simon Richter
Hi, > A suggestion: we restrict where packages can install files and what > maintainer scripts can do. The default should be as safe as we can > make it, and packages that need to do things not allowed by the > default should declare they that they intend to do that. I've held a short inflammator

Re: Limiting the power of packages

2018-10-04 Thread Wouter Verhelst
On Thu, Oct 04, 2018 at 01:27:29PM +0200, Enrico Weigelt, metux IT consult wrote: > Yes, that would have to be customized per-package, but we're only > talking about a hand full of packages, anyways. Eh, no. -- Could you people please use IRC like normal people?!? -- Amaya Rodrigo Sastre, tr

Re: Limiting the power of packages

2018-10-04 Thread Ralf Treinen
On Thu, Oct 04, 2018 at 11:07:37AM +0200, W. Martin Borgert wrote: > On 2018-10-03 23:30, Antoine Beaupré wrote: > > There > > are somewhat low-hanging fruits in there like declarative maintainer > > scripts. > > I am very much in favour of declarative maintainer scripts! > AFAIK, Niels Thykier ha

Re: Limiting the power of packages

2018-10-04 Thread intrigeri
Paul Wise: > On Thu, Oct 4, 2018 at 11:31 AM Antoine Beaupré wrote: >> Beyond this issue, what I'm mostly concerned about these days is >> isolation between different apps. Our only solution on the desktop right >> now is Qubes and it seems rather overengineered for my needs. > Our solution here i

Re: Limiting the power of packages

2018-10-04 Thread Philipp Kern
On 04.10.2018 13:17, Enrico Weigelt, metux IT consult wrote: >> (Note that I'm not saying Microsoft or Google are doing something >> nefarious here: > > But I do think that. If they really wanted to do that in a reasonably > secure and safe way (assuming they're not completely incompetent), > the

Re: Limiting the power of packages

2018-10-04 Thread Xavier
Le 04/10/2018 à 13:20, Paride Legovini a écrit : > Lars Wirzenius wrote on 03/10/2018: >> The problem: when a .deb package is installed, upgraded, or removed, >> the maintainer scripts are run as root and can thus do anything. >> >> Sometimes what they do is an unwelcome surprise to the user. For >

Re: Limiting the power of packages

2018-10-04 Thread Enrico Weigelt, metux IT consult
On 04.10.2018 01:19, Carl-Valentin Schmitt wrote: > It would be a possibility, for safety to create a new directory only for > brandy 3rd-party-software like skype, Google Chrome, Swift, and else > Software where huge companies are Sponsors. >   > This would then mean, to create a second sources li

Re: Limiting the power of packages

2018-10-04 Thread Paride Legovini
Lars Wirzenius wrote on 03/10/2018: > The problem: when a .deb package is installed, upgraded, or removed, > the maintainer scripts are run as root and can thus do anything. > > Sometimes what they do is an unwelcome surprise to the user. For > example, the Microsoft Skype .deb and the Google Chro

Re: Limiting the power of packages

2018-10-04 Thread Enrico Weigelt, metux IT consult
On 03.10.2018 19:19, Lars Wirzenius wrote: > Sometimes what they do is an unwelcome surprise to the user. For > example, the Microsoft Skype .deb and the Google Chrome .deb add to > the APT sources lists and APT accepted signing keys. Some users do not > realise this, and are unpleasantly surprise

Re: Limiting the power of packages

2018-10-04 Thread Jonathan Dowland
On Thu, Oct 04, 2018 at 12:09:05PM +0200, Thomas Goirand wrote: And prevent stuff like with the bumblebee uninstall disaster because of an added space, for example: rm -rf /usr /share/foo/bar.conf Yes, or the similar bug in steam-for-linux steam.sh. Although neither made it into the Debian arc

Re: Limiting the power of packages

2018-10-04 Thread Jonathan Dowland
On Thu, Oct 04, 2018 at 01:19:43AM +0200, Carl-Valentin Schmitt wrote: It would be a possibility, for safety to create a new directory only for brandy 3rd-party-software like skype, Google Chrome, Swift, and else Software where huge companies are Sponsors. This would then mean, to create a secon

Re: Limiting the power of packages

2018-10-04 Thread Thomas Goirand
On 10/4/18 10:06 AM, Jonathan Dowland wrote: > On Wed, Oct 03, 2018 at 11:30:40PM -0400, Antoine Beaupré wrote: >> Yet I still think we should start fixing those problems. > > +1 > >> Yes, there are a billion things that could go wrong in the current >> approach, but if we had *some* safety net,

Re: Limiting the power of packages

2018-10-04 Thread Thomas Goirand
On 10/4/18 1:19 AM, Carl-Valentin Schmitt wrote: > It would be a possibility, for safety to create a new directory only for > brandy 3rd-party-software like skype, Google Chrome, Swift, and else > Software where huge companies are Sponsors. >   > This would then mean, to create a second sources lis

Re: Limiting the power of packages

2018-10-04 Thread W. Martin Borgert
On 2018-10-03 23:30, Antoine Beaupré wrote: > There > are somewhat low-hanging fruits in there like declarative maintainer > scripts. I am very much in favour of declarative maintainer scripts! AFAIK, Niels Thykier has done a lot of work there, while Ralf Treinen and colleagues are analysing maint

Re: Limiting the power of packages

2018-10-04 Thread W. Martin Borgert
On 2018-10-04 09:06, Jonathan Dowland wrote: > What about running Chromium as root? Certainly not recommended, but what > are the user's expectations if they try it anyway? With nowadays web, I would disallow this by default. If root types their sentence ("Yes, I know..."), they can shoot themself

Re: Limiting the power of packages

2018-10-04 Thread Florian Weimer
* Simon McVittie: > On Thu, 04 Oct 2018 at 08:34:15 +0200, Florian Weimer wrote: >> * Paul Wise: >> > To fully solve the problem you need a whitelist based approach that >> > ends up something completely different like Flatpak. >> >> Flatpaks don't work this way. Try installing gedit and open a

Re: Limiting the power of packages

2018-10-04 Thread Jonathan Dowland
On Wed, Oct 03, 2018 at 11:30:40PM -0400, Antoine Beaupré wrote: Yet I still think we should start fixing those problems. +1 Yes, there are a billion things that could go wrong in the current approach, but if we had *some* safety net, controlled in the sources.list file, we could at least res

Re: Limiting the power of packages

2018-10-04 Thread Simon McVittie
On Thu, 04 Oct 2018 at 08:34:15 +0200, Florian Weimer wrote: > * Paul Wise: > > To fully solve the problem you need a whitelist based approach that > > ends up something completely different like Flatpak. > > Flatpaks don't work this way. Try installing gedit and open a file > like ~/.ssh/id_rsa

Re: Limiting the power of packages

2018-10-04 Thread Paul Wise
On Thu, Oct 4, 2018 at 3:24 PM Florian Weimer wrote: > Flatpaks don't work this way. Try installing gedit and open a file > like ~/.ssh/id_rsa with it. There are no security prompts whatsoever, > yet the software in a flatpak can read your SSH private key. AFAIK, the only way a Flatpak can read

Re: Limiting the power of packages

2018-10-04 Thread Florian Weimer
* Paul Wise: > To fully solve the problem you need a whitelist based approach that > ends up something completely different like Flatpak. Flatpaks don't work this way. Try installing gedit and open a file like ~/.ssh/id_rsa with it. There are no security prompts whatsoever, yet the software in

Re: Limiting the power of packages

2018-10-03 Thread Paul Wise
On Thu, Oct 4, 2018 at 11:31 AM Antoine Beaupré wrote: > Yes well, we *could* consider rewriting Debian to be based on > appimage/flatpak/snappy, but that would be a rather controversial > change. I think there are smaller, incremental steps we can take before > that to improve the situation witho

Re: Limiting the power of packages

2018-10-03 Thread Guillem Jover
Hi! On Thu, 2018-10-04 at 08:38:09 +0800, Paul Wise wrote: > On Thu, Oct 4, 2018 at 1:19 AM Lars Wirzenius wrote: > > The problem: when a .deb package is installed, upgraded, or removed, > > the maintainer scripts are run as root and can thus do anything. Paul prompted a similar discussion the ot

Re: Limiting the power of packages

2018-10-03 Thread Antoine Beaupré
On 2018-10-04 08:38:09, Paul Wise wrote: > On Thu, Oct 4, 2018 at 1:19 AM Lars Wirzenius wrote: > >> The problem: when a .deb package is installed, upgraded, or removed, >> the maintainer scripts are run as root and can thus do anything. > > anarcat wrote this related wiki page that covers this gen

Re: Limiting the power of packages

2018-10-03 Thread Paul Wise
On Thu, Oct 4, 2018 at 1:19 AM Lars Wirzenius wrote: > The problem: when a .deb package is installed, upgraded, or removed, > the maintainer scripts are run as root and can thus do anything. anarcat wrote this related wiki page that covers this general topic: https://wiki.debian.org/UntrustedDeb

Re: Limiting the power of packages

2018-10-03 Thread Carl-Valentin Schmitt
It would be a possibility, for safety to create a new directory only for brandy 3rd-party-software like skype, Google Chrome, Swift, and else Software where huge companies are Sponsors. This would then mean, to create a second sources list for 3rd-party-links. Carl-Valentin Schmitt schrieb am

Re: Limiting the power of packages

2018-10-03 Thread Carl-Valentin Schmitt
in /usr only ?... I thought therefore in later years Linux had created /opt ? Lars Wirzenius schrieb am Mi., 3. Okt. 2018, 19:19: > The problem: when a .deb package is installed, upgraded, or removed, > the maintainer scripts are run as root and can thus do anything. > > Sometimes what they d

Re: Limiting the power of packages

2018-10-03 Thread Mike Hommey
On Wed, Oct 03, 2018 at 08:19:17PM +0300, Lars Wirzenius wrote: > The problem: when a .deb package is installed, upgraded, or removed, > the maintainer scripts are run as root and can thus do anything. > > Sometimes what they do is an unwelcome surprise to the user. For > example, the Microsoft Sk

Re: Limiting the power of packages

2018-10-03 Thread Jonathan Dowland
On Wed, Oct 03, 2018 at 08:19:17PM +0300, Lars Wirzenius wrote: A suggestion: we restrict where packages can install files and what maintainer scripts can do. The default should be as safe as we can make it, and packages that need to do things not allowed by the default should declare they that t