Bug#526854: [Pkg-utopia-maintainers] Bug#526854: hal: HAL should not require PolicyKit

2009-05-04 Thread Michael Biebl
Fredrik Tolf wrote:
 On Mon, 2009-05-04 at 09:52 +0200, Michael Biebl wrote:
 I have not researched it in detail yet, so I don't really know if it's a 
 good
 So you are basing your request on FUD?
 
 I don't think so. What I meant by not researching was whether the
 solution of splitting it into two packages would be plausible.
 
 As for my wider argument, I may be wrong somewhere along the line, but
 please correct me if that is so. My argument is this:
 
 First, as far as I know, PolicyKit is essentially a system for granting
 privileges to a user which he would not have without it. In other words,
 depending on the configuration of PolicyKit, a user may be allowed to do
 things he would not be allowed to without it [see note 1].

Well, that is also true for the group based approach that was previously used in
HAL, just much more coarse grained and less flexible and dynamic.

 Second, the configuration and operation of PolicyKit is not well-known,
 unlike normal Unix security.

That basically reads, like you are missing proper documentation.
Have you installed policykit-doc and read the documentation provided there (best
read with devhelp)?

But certainly documentation can always be improved.

 Third, Debian previously used ordinary Unix groups to assign various
 HAL-related privileges to users. Everyone known how Unix groups work; if
 a user wasn't a member of any particular groups, he would be granted no
 unexpected privileges.

We invented groups like plugdev/netdev/powerdev in HAL, to control access to the
HAL D-Bus service. Yet the exact meaning of those groups is very vague (or can
you tell me which privileges you exactly get by being a member of e.g. group
plugdev?) This is now replaced with PolicyKit. With the HAL policykit
configuration file (you can inspect the HAL PolicyKit configuration with
polkit-gnome-authorization), it is much clearer (and documented) what privileges
are granted.

Again, the group-based approach is less flexible, too coarse grained, not
dynamic and not scalable. Thus PolicyKit is a definit improvement (security 
wise).

What I miss from your arguments are solid, technical reasons, why PolicyKit is,
as you put it, a bad idea.


Cheers,
Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#526854: [Pkg-utopia-maintainers] Bug#526854: hal: HAL should not require PolicyKit

2009-05-04 Thread Fredrik Tolf
On Mon, 2009-05-04 at 21:06 +0200, Michael Biebl wrote:
 That basically reads, like you are missing proper documentation.
 Have you installed policykit-doc and read the documentation provided there 
 (best
 read with devhelp)?
[...]
 We invented groups like plugdev/netdev/powerdev in HAL, to control access to 
 the
 HAL D-Bus service. Yet the exact meaning of those groups is very vague (or can
 you tell me which privileges you exactly get by being a member of e.g. group
 plugdev?)
[...]
 Again, the group-based approach is less flexible, too coarse grained, not
 dynamic and not scalable. Thus PolicyKit is a definit improvement (security 
 wise).
[...]
 What I miss from your arguments are solid, technical reasons, why PolicyKit 
 is,
 as you put it, a bad idea.

Based on your comments, I think you misunderstand me. I don't think
PolicyKit is a bad idea, and I agree that the groups previously used
were too coarsely grained and too unclear about what privileges were
granted through them.

What I do think is a bad idea is installing policykit by default, as a
hard dependency of HAL. Even if I don't know exactly what privileges are
granted through the `plugdev' group, I do know for sure that without
being a member of it, no privileges at all are granted, which is
something I cannot necessarily know with PolicyKit.

In fact, I installed policykit-doc, as you suggested, and from reading
it, it seems that it is the inidividual packages that grant privileges
by default simply by installing policy files
into /usr/share/PolicyKit/policy. For example, merely by having
NetworkManager installed, local users would automatically be granted
privilege to change networks, whereas previously, I would have to make
them part of the netdev group, explicitly.

My point, therefore, is that since the installation of PolicyKit grants
privileges to users merely by virtue of being installed, it should not
be installed automatically. If it is installed automatically, I should
at least have to turn it on explicitly.

Fredrik Tolf





-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#526854: [Pkg-utopia-maintainers] Bug#526854: hal: HAL should not require PolicyKit

2009-05-04 Thread Fredrik Tolf
On Mon, 2009-05-04 at 23:12 +0200, Fredrik Tolf wrote:
 What I do think is a bad idea is installing policykit by default, as a
 hard dependency of HAL.

Just in case I wasn't clear enough, my argument is this: Without
PolicyKit, I had to take explicit action in order to grant privileges to
users, while with PolicyKit, I have to take explicit action in order to
*not* grant privileges to users. Therefore, it should not be installed
by default, since the mere act of installing it suddenly gives all my
existing users new privileges, without me, the administrator, even being
warned of such a thing.

Fredrik Tolf





-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#526854: [Pkg-utopia-maintainers] Bug#526854: hal: HAL should not require PolicyKit

2009-05-04 Thread Martin Pitt
Fredrik Tolf [2009-05-04 21:37 +]:
 Just in case I wasn't clear enough, my argument is this: Without
 PolicyKit, I had to take explicit action in order to grant privileges to
 users, while with PolicyKit, I have to take explicit action in order to
 *not* grant privileges to users.

That's not an inherent property of PK vs. groups, but a matter of
default configuration. E. g. the installer used to put the default
user into plugdev, powerdev, etc., and users-admin (from
gnome-system-tools) did similar things for a desktop user. Likewise,
there are PolicyKit privileges which you don't have as an user, for
good reason (like mounting an internal hard disk).

The job of us as a distro is to provide a sensible default
configuration which provides a good balance between security and
usability. For example, it doesn't make much sense to deny access to
an USB camera or scanner to an user at a local console; he has
physical access to those devices, after all. On the other hand, an
user logging in through ssh should arguably not have these
capabilities.

Thus I am very much against making PK optional. It will only aggravate
the confusion, since there will be systems which use PK and some which
don't. History showed that device access privileges can't be sensibly
mapped to and maintained with static group membership, so we should
settle to _one_ system of verifying privileges, also to be compatible
with the rest of the world.

To be fair, I had very similar feelings like you when I heared about
PK the first time, since it seemed to be that ominous new thing which
opened root holes in the background. :-)

Just my € 0.02,

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org