Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Todd C . Miller
This thread is now closed, please don't try to continue it. - todd

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Dan
If I'm explaining security or lack of security, or saying things like "this is not enough", it's not as part of a speech that's meant to whine. I'll explain: I could've just asked, in my first message, whether OpenBSD has a mechanism like Ctrl-Alt-Delete on Windows, and whether it has

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Dan
> 1.- Are you worried about the fact that apps on X11 may suffer Emphasis on "may". > input-spoofing? Great, start writing all the code necessary to prevent > that from happening and help us improve the security of OpenBSD and any > other OS that uses X11. There's already rootles

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Jose Maldonado
ng all the code necessary to prevent that from happening and help us improve the security of OpenBSD and any other OS that uses X11. Coming here and saying that we are not attentive to security and that is why we "HAVE" to do something, is utter idiocy. Start doing something yourself, if you wan

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-31 Thread Dan
On Wednesday, March 27, 2024, Dan wrote: > Hello, I have 3 security-related questions: > (1) Does OpenBSD have a mechanism like Ctrl-Alt-Delete on Windows (Secure > Attention Key, or SAK) to prevent malware (or a website in fullscreen, for > example) from faking a logout process a

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-30 Thread Dan
On Saturday, March 30, 2024, hahahahacker2009 wrote: > Vào Th 7, 30 thg 3, 2024 vào lúc 11:19 Dan đã > viết: > > >> > >> > >> > I've looked at the > >> > source code and issue tracker of upstream Firefox in the past and it > has > >> > upstream support for pledge(2) and unveil(2). > >> > >>

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-30 Thread Dan
On Saturday, March 30, 2024, hahahahacker2009 wrote: > Vào Th 6, 29 thg 3, 2024 vào lúc 07:40 Dan đã > viết: > > > This only lists third-party packages that have an OpenBSD > ports-originated addition of pledge/unveil configuration files; packages > that use pledge/unveil without

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-30 Thread Dan
James Huddle : > I live in post-2016 USA and have essentially given up hope of any sort of > computer security. Personal thought and from USA where the core of private data business resides. Due to different reasons and the env I work in I results attacked very often under OpenBSD

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-30 Thread James Huddle
or Exfiltration, 'ex'+10) about a year ago. LOL. I actually did not know about the vulnerability. Thanks, Matthew. And yes, I was voicing the untested theory of precisely what you articulated, Luke. I live in post-2016 USA and have essentially given up hope of any sort of computer security. Th

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-29 Thread Dan
Replying now to cho...@jtan.com: >[…] any >application which uses the X server (ie. can access the tcp port >or unix socket and has the correct xauth key […] The default PF configuration blocks access to the ports, but only on non-loopback interfaces.

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-29 Thread Dan
(Note for everyone: This message is intended to shame a troll; if you're here to follow the technical discussion only, feel free to skip reading this message.) ~ | ~ | ~ | ~ | ~ | ~ On Friday, March 29, 2024, Jan Stary wrote: > > > > (The person > > > > you're replying to should be in the To

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-29 Thread chohag
Luke A. Call writes: > > On 2024-03-29 09:01:07-0400, James Huddle wrote: > > Exfiltrator. There's an 11-letter word that starts with "ex". X11. > > After a quick web search, I'm not sure I follow. Is that a reference to > a program that exfiltrates data after a computer is compromised? Can

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-29 Thread Luke A. Call
'm no X expert, but I think what you are saying is technically correct > > across users, but I believe it is possible for one application to > > sniff the keystrokes input to another app running under the *same* user, at > > least, and under different users in the same X session d

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-29 Thread James Huddle
I think what you are saying is technically correct > across users, but I believe it is possible for one application to > sniff the keystrokes input to another app running under the *same* user, at > least, and under different users in the same X session depending on how > they connect. S

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread Dan
gram and the desktop it's running under > > have different UIDs (rather than locking the desktop, logging into a > > different user with a new desktop session using a SAK like > Ctrl-Alt-Delete, > > and running it there), but I found this old blog post, by whom I believe > i

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread Luke A. Call
e* user, at least, and under different users in the same X session depending on how they connect. Specifically: 1) Under `man xterm' in the "SECURITY" section it says some related things that sound like that is what they are saying. I can't elaborate on what it says there but that ma

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread Peter N. M. Hansteen
On Thu, Mar 28, 2024 at 09:16:45PM +, Dan wrote: > You didn't "Reply All", so I didn't get your reply in my inbox. (The person > you're replying to should be in the To field, and the mailing list in the > Cc field.) OH PUH-LEEZE. No. You send to a mailing list, people are supposed to

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread h . kampmann
Hello, when I read posts like @Dan's, I say to myself: Don't feed the troll. Pointless. Wish you all a nice weekend, Heinz       Gesendet: Donnerstag, 28. März 2024 um 23:02 Uhr Von: "Jan Stary" An: misc@openbsd.org Betreff: Re: Security questions: Login spoofing, X11

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread Jan Stary
ferent user with a new desktop session using a SAK like Ctrl-Alt-Delete, > and running it there), but I found this old blog post, by whom I believe is > the founder of Qubes OS, being cited somewhere: > https://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html >

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread deich...@placebonol.com
not in the mailing list world I've been using for close to 30 years if you post to the mailing list I reply to the mailing list On March 28, 2024 3:16:45 PM MDT, Dan wrote: >You didn't "Reply All", so I didn't get your reply in my inbox. (The person >you're replying to should be in the To

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread Dan
bes OS, being cited somewhere: https://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html It is common knowledge that X11 is insecure by design, not (only) by the ancient code, so even if the blog post isn't relevant anymore, it wouldn't surprise me if such attacks

Re: Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-28 Thread Jan Stary
res this key > combination and takes over with a real login prompt that malware can't fake > without first defeating the OS security. Any X11 program can display a screen that looks like the login screen. Even on windows; this has nothing to do with intercepting ctrl-alt-del. > (2)

Re: One more thought about security..

2024-03-27 Thread Dan
Awesome, blacklists are still affordable at time word of mouth! We got up too eatly today, take a nap like everyone do and care about your dears.. -Dan Mar 27, 2024 11:51:32 hahahahacker2009 : > -- Forwarded message - > From: Mihai Popescu > Date: Th 7, 24 thg 2, 2024 vào

Security questions: Login spoofing, X11 keylogging, and sandboxed apps

2024-03-27 Thread Dan
Hello, I have 3 security-related questions: (1) Does OpenBSD have a mechanism like Ctrl-Alt-Delete on Windows (Secure Attention Key, or SAK) to prevent malware (or a website in fullscreen, for example) from faking a logout process and/or faking a login prompt? On Windows the kernel ensures

Re: One more thought about security..

2024-03-27 Thread hahahahacker2009
-- Forwarded message - From: Mihai Popescu Date: Th 7, 24 thg 2, 2024 vào lúc 08:15 Subject: Re: If you need to gamify... To: Captain Warez, Sir, This list has already its share of spam and i think it doesn't need yours. Some of us are reading messages from web list

One more thought about security..

2024-03-26 Thread Dan
Hello, Just adding a simple evidence: dark mode is difficult to print. If you are dedicating time to web browser and email client development in OpenBSD.. I suggest to point antennas on dark mode too.. -Dan

Re: Is this a security issue?

2024-03-13 Thread jslee via misc
Hi, On Thu, 14 Mar 2024, at 00:25, ofthecentury wrote: >. And I was under the impression there would be no graphics > errors week 1 of me using OpenBSD due to the way OpenBSD was > centered around code auditing and only releasing something very > stable and tested, especially something so

Re: Is this a security issue?

2024-03-13 Thread ofthecentury
gt; Just saw this in my /var/log/messages: > > > > '/bsd: drm:pid1338:intel_pipe_update_start *ERROR* > > [drm] *ERROR* Potential atomic update failure on pipe B' > > > > Intel_pipe_update??? > > > > No, it isn't a security issue, it's an underrun on the

Re: Is this a security issue?

2024-03-13 Thread Peter N. M. Hansteen
On Wed, Mar 13, 2024 at 05:01:57PM +0500, ofthecentury wrote: > Just saw this in my /var/log/messages: > > '/bsd: drm:pid1338:intel_pipe_update_start *ERROR* > [drm] *ERROR* Potential atomic update failure on pipe B' > > Intel_pipe_update??? > A fairly simple web search would have provided

Re: Is this a security issue?

2024-03-13 Thread Zé Loff
On Wed, Mar 13, 2024 at 05:01:57PM +0500, ofthecentury wrote: > Just saw this in my /var/log/messages: > > '/bsd: drm:pid1338:intel_pipe_update_start *ERROR* > [drm] *ERROR* Potential atomic update failure on pipe B' > > Intel_pipe_update??? > No, it isn't a security is

Is this a security issue?

2024-03-13 Thread ofthecentury
Just saw this in my /var/log/messages: '/bsd: drm:pid1338:intel_pipe_update_start *ERROR* [drm] *ERROR* Potential atomic update failure on pipe B' Intel_pipe_update???

Re: ***UNCHECKED*** Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-28 Thread Why 42? The lists account.
On Thu, Dec 21, 2023 at 08:20:37AM -0300, Crystal Kolipe wrote: > > login.conf used to allow unlimited datasize for the 'daemon' class. That was > > changed to cap at 4G > > Actually the value is an architecture dependent setting. > > On amd64 it is indeed 4G, but typically 1024 Mb on the

Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-21 Thread Crystal Kolipe
On Thu, Dec 21, 2023 at 10:54:14AM -, Stuart Henderson wrote: > On 2023-12-20, Why 42? The lists account. wrote: > > > > Just tried the mount of /tmp manually from the command line at got: > > mount_mfs: mmap: Cannot allocate memory > > > > When I halved the size (memory) allocated

Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-21 Thread Stuart Henderson
On 2023-12-20, Why 42? The lists account. wrote: > > Just tried the mount of /tmp manually from the command line at got: > mount_mfs: mmap: Cannot allocate memory > > When I halved the size (memory) allocated (-s=2097152) it mounts > successfully: > mjoelnir:robb 20.12 19:50:02 # df -h /tmp >

Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-20 Thread Crystal Kolipe
On Thu, Dec 21, 2023 at 12:16:33AM +0200, Mihai Popescu wrote: > > Why didn't you just bump the daemon datasize in /etc/login.conf to the > > required value? > > this is there for a reason and if you keep "bumping" it, maybe it should be > removed. OK, then: 1. Read the docs and source. 2.

Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-20 Thread Mihai Popescu
> Why didn't you just bump the daemon datasize in /etc/login.conf to the > required value? Because The Creator said once this is there for a reason and if you keep "bumping" it, maybe it should be removed.

Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-20 Thread Crystal Kolipe
On Wed, Dec 20, 2023 at 07:55:29PM +0100, Why 42? The lists account. wrote: > When I halved the size (memory) allocated (-s=2097152) it mounts > successfully Why didn't you just bump the daemon datasize in /etc/login.conf to the required value?

Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-20 Thread Why 42? The lists account.
scription. > (and yes, I have seen events where a major upgrade caused a lot of noise in > a "something changed" file...which unfortunately hid something we needed to > know about ALSO happened, and was dismissed as "part of the upgrade noise". > This wasn't OpenBS

Re: Post (snap) update emails: fsck errors and (in)security output

2023-12-20 Thread Nick Holland
is expected. Seeing that "su" went from 20k to 70k might warrant investigation. (and yes, I have seen events where a major upgrade caused a lot of noise in a "something changed" file...which unfortunately hid something we needed to know about ALSO happened, and was dismissed

Post (snap) update emails: fsck errors and (in)security output

2023-12-20 Thread Why 42? The lists account.
... Reply-To: Hi All, A couple of questions ... I have "ROOTBACKUP=1" in /etc/daily.local to replicate my root partition as described in the FAQ (https://www.openbsd.org/faq/faq14.html#altroot) I noticed after an update to a new snapshot via sysupgrade that the next daily output email

Re: Open-source security processor

2023-09-07 Thread Markus Wernig
On 9/8/23 00:24, Richard Thornton wrote: Say you had the guts of an x86_64 desktop running Windows on the bench and another computer running OpenBSD right next to it, is there some mechanism available that could allow you to integrity scan the NVMe drive (and also the firmware but that's

Open-source security processor

2023-09-07 Thread Richard Thornton
Apologies, this might be a little bit OT but I was thinking of this and I thought about the wonderful folks at OpenBSD. Say you had the guts of an x86_64 desktop running Windows on the bench and another computer running OpenBSD right next to it, is there some mechanism available that could allow

Re: RSS or Atom syndication for security advisories?

2023-05-30 Thread Kapetanakis Giannis
>> As a user, I simply suggest creating an RSS channel for security advisories >> and *even* I offer myself to help. >> >> The intention behind was to improve OpenBSD web. Simply. > The number of people who work on errata, for obvious reasons, needs > to be a small set of

Re: RSS or Atom syndication for security advisories?

2023-05-23 Thread Stuart Henderson
On 2023/05/23 09:35, Xavier wrote: > I did not say that. I did not see that you in particular, or anyone in this > mailing list, make this work. > As a user, I simply suggest creating an RSS channel for security advisories > and *even* I offer myself to help. > > Th

Re: RSS or Atom syndication for security advisories?

2023-05-23 Thread Xavier
I did not say that. I did not see that you in particular, or anyone in this mailing list, make this work. As a user, I simply suggest creating an RSS channel for security advisories and *even* I offer myself to help. The intention behind was to improve OpenBSD web. Simply. I want to thank

Re: RSS or Atom syndication for security advisories?

2023-05-23 Thread Xavier
Thanks a lot, Brian. Very appreciated. So now the only work is to merge to www A 22.05.2023 15:50, Brian Conway escrigué: On Mon, May 22, 2023, at 9:59 AM, Xavier wrote: I don't know if you say it seriously. If you do, I think it's the best. Perhaps you could write some semantic file and

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Brian Conway
On Mon, May 22, 2023, at 9:59 AM, Xavier wrote: > I don't know if you say it seriously. If you do, I think it's the best. > Perhaps you could write some semantic file and convert them to desired > format (html, RSS, etc.). > I saw the www repo >

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Theo de Raadt
I am not going to do any of this work you want. Good bye. Xavier wrote: > "Theo de Raadt" said: > > > I'd be thrilled to do less work on errata! > > How about we do RSS, and stop making errata? > > We can do static RSS. > > Configure and forget. > > I don't know if you say it seriously. If

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Xavier
"Theo de Raadt" said: I'd be thrilled to do less work on errata! How about we do RSS, and stop making errata? We can do static RSS. Configure and forget. I don't know if you say it seriously. If you do, I think it's the best. Perhaps you could write some semantic file and convert them to

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Theo de Raadt
Stuart Henderson wrote: > On 2023-05-22, Xavier B. wrote: > > Why? > > If you make too much extra work for people who are handling errata, > they won't want to handle errata any more. I'd be thrilled to do less work on errata! How about we do RSS, and stop making errata? We can do static

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Stuart Henderson
On 2023-05-22, Xavier B. wrote: > Why? If you make too much extra work for people who are handling errata, they won't want to handle errata any more. The simplest way to check for new updates for on an OpenBSD system is to run syspatch -c, or subscribe to the "announce" mailing list. If you

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Daniel Ouellet
, May 21, 2023 at 06:26:12PM +, Xavier B. wrote: Thanks, Hiltjo, for your help. I very appreciate that. Perhaps it could be useful to place it in official site. What do you think? What kind of software do you use to generate the web page? Perhaps I could help you to add RSS security

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Stuart Henderson
On 2023-05-21, Xavier B. wrote: > What kind of software do you use to generate the web page? Depends on the developer who is updating it at the time, but I think probably for most it will one of vi, vim, emacs or mg.

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Xavier B.
> > Perhaps it could be useful to place it in official site. > > > > What do you think? What kind of software do you use to generate the web > > > > page? Perhaps I could help you to add RSS security advisories. > > > > > > > > > > Hi, > > > > > > You're welcome, but to be clear: I only posted the link. > > > > > > http://undeadly.org/cgi?action=about > > > > >

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Theo de Raadt
M +, Xavier B. wrote: > > > Thanks, Hiltjo, for your help. I very appreciate that. > > > > > > Perhaps it could be useful to place it in official site. > > > What do you think? What kind of software do you use to generate the web > > > page? Perhap

Re: RSS or Atom syndication for security advisories?

2023-05-22 Thread Xavier B.
ppreciate that. > > > > Perhaps it could be useful to place it in official site. > > What do you think? What kind of software do you use to generate the web > > page? Perhaps I could help you to add RSS security advisories. > > > > Hi, > > You're welcome,

Re: RSS or Atom syndication for security advisories?

2023-05-21 Thread Hiltjo Posthuma
you to add RSS security advisories. > Hi, You're welcome, but to be clear: I only posted the link. http://undeadly.org/cgi?action=about > Thanks, > Xavier > > On Sun, 21 May 2023 16:03:54 +0200 > Hiltjo Posthuma ha escrit: > > > On Sun, May 21, 2023 at 1

Re: RSS or Atom syndication for security advisories?

2023-05-21 Thread Xavier B.
Thanks, Hiltjo, for your help. I very appreciate that. Perhaps it could be useful to place it in official site. What do you think? What kind of software do you use to generate the web page? Perhaps I could help you to add RSS security advisories. Thanks, Xavier On Sun, 21 May 2023 16:03:54

Re: RSS or Atom syndication for security advisories?

2023-05-21 Thread Daniel Ouellet
and arch), FreeBSD and OpenBSD. I have a news reader and I'm subscribed to many operating systems security advisories so ocassionally I know there are some security bugs and then I need to update one of my machine system. Regarding to OpenBSD I just saw this errata page [https://www.openbsd.org

Re: RSS or Atom syndication for security advisories?

2023-05-21 Thread Daniele B.
t to know if there is an RSS or Atom syndication advisories. > > I have several machines with several operaring system in them: GNU/Linux > (alpine and arch), FreeBSD and OpenBSD. > I have a news reader and I'm subscribed to many operating systems security > advisories so ocassionally I know

Re: RSS or Atom syndication for security advisories?

2023-05-21 Thread Hiltjo Posthuma
a news reader and I'm subscribed to many operating systems security > advisories so ocassionally I know there are some security bugs and then I > need to update one of my machine system. > > > Regarding to OpenBSD I just saw this errata page > [https://www.openbsd.org/errata7

RSS or Atom syndication for security advisories?

2023-05-21 Thread Xavier B.
Hi, I just want to know if there is an RSS or Atom syndication advisories. I have several machines with several operaring system in them: GNU/Linux (alpine and arch), FreeBSD and OpenBSD. I have a news reader and I'm subscribed to many operating systems security advisories so ocassionally I

Re: Multiuser security on OpenBSD

2022-08-10 Thread Luke A. Call
neral, OpenBSD seems to be the least-likely OS to allow privilege escalation (see www.openbsd.org under the security link, LH side near top, only 2 remotely exploitable holes in the default install since ~1996, etc). Due to recent reports of a bug allowing key detection based on cpu usage variations (

Multiuser security on OpenBSD

2022-08-09 Thread Dave Levine
Hello all, I'm new to the mailing list so feel free to yell at me if I messed something up here. I currently use OpenBSD on my laptop for a number of reasons, mainly performance and hardware support. However, I have been considering setting up a multiuser POWER9 box for some Discord friends and

Re: rpcbind security

2022-06-18 Thread Philip Guenther
On Fri, Jun 17, 2022 at 8:42 PM Gustavo Rios wrote: > Excuse me, but how does rpcbind know that a incoming request, for > set/unset, comes from the root user ? > Theo has already told you how the *portmap* program decides that: by looking at the host and port the request is coming from. (There

rpcbind security

2022-06-17 Thread Gustavo Rios
Excuse me, but how does rpcbind know that a incoming request, for set/unset, comes from the root user ? Thanks. -- The lion and the tiger may be more powerful, but the wolves do not perform in the circus

Re: rpcbind security

2022-06-17 Thread Theo de Raadt
I am certain you can find it yourself. Gustavo Rios wrote: > may some here points me where rpcbind is implemented ? I would like to see > the C code > of it. > Thanks. > > Em sex., 17 de jun. de 2022 às 00:20, Theo de Raadt > escreveu: > > Gustavo Rios wrote: > > > Hi folks! > > > >

Re: rpcbind security

2022-06-17 Thread Gustavo Rios
may some here points me where rpcbind is implemented ? I would like to see the C code of it. Thanks. Em sex., 17 de jun. de 2022 às 00:20, Theo de Raadt escreveu: > Gustavo Rios wrote: > > > Hi folks! > > > > How does openbsd rpcbind prevent ordinary users to unset a given rpc port > > mapping

Re: rpcbind security

2022-06-16 Thread Theo de Raadt
Gustavo Rios wrote: > Hi folks! > > How does openbsd rpcbind prevent ordinary users to unset a given rpc port > mapping registered by, for instance, the root user ? Poorly. It will only allow local root (who request upon a reserved port) to touch ports which are reserved (< 1024), and 2049 is

rpcbind security

2022-06-16 Thread Gustavo Rios
Hi folks! How does openbsd rpcbind prevent ordinary users to unset a given rpc port mapping registered by, for instance, the root user ? Thanks. -- The lion and the tiger may be more powerful, but the wolves do not perform in the circus

Re: mount(8) security and symlink(7)

2021-06-25 Thread Reuben ua Bríġ
errata: > Date: Sat, 26 Jun 2021 02:03:18 +1000 (+1000) > From: Reuben ua Bríġ > after learning that OpenSTMP had used sytem(3) rather than execv(3) > resulting in a bug reminiscent of the morris-worm i had guessed it was system(3), but having now seen the advisory:

Re: mount(8) security and symlink(7)

2021-06-25 Thread Reuben ua Bríġ
> And i am going to suggest you show a diff, and go through the process > Ingo just described as i said, i am new to this, and wanted to discuss something in words before providing a C diff that would doubtless be rejected given that i have only just begun to learn C. i would have been happy to

Re: mount(8) security and symlink(7)

2021-06-25 Thread Theo de Raadt
Reuben ua Bríġ wrote: > hi ingo, thanks for your reply. > > > I can't talk about the internals of the mount(2) syscall, > > so i pass on that one to people who know better. > > !!! i feel i should emphasize, > i am *not* presently suggesting any change to the mount(2) *system call* > i *am*

Re: mount(8) security and symlink(7)

2021-06-25 Thread Reuben ua Bríġ
hi ingo, thanks for your reply. > I can't talk about the internals of the mount(2) syscall, > so i pass on that one to people who know better. !!! i feel i should emphasize, i am *not* presently suggesting any change to the mount(2) *system call* i *am* suggesting a change to the mount(8)

Re: mount(8) security and symlink(7)

2021-06-25 Thread Ingo Schwarze
Hi, Reuben ua Brig wrote: > when OpenBSD is happy to change even man.conf We change things when all of the following hold: 1. There is a significant problem to be solved, or a significant profit to be gained. Regarding man.conf: the old format was over-engineered, wordy, hard to use,

Re: mount(8) security and symlink(7)

2021-06-25 Thread Reuben ua Bríġ
r point? i felt doing so would have strayed beyond usefulness. > Your comment about man.conf suggests we changed something which you > hate and you want to wield it against us. my point is that my impression of OpenBSD and your own policy has been that it is acceptable to break a configurat

Re: mount(8) security and symlink(7)

2021-06-25 Thread Theo de Raadt
Reuben ua Bríġ wrote: > > I wonder why noone implimented such checks like that in the last 30 > > years. Might be because it breaks more than it fixes. > > i cant tell if you are being sarcastic or what it could possibly break > or why that would matter when OpenBSD is happy to change even

Re: mount(8) security and symlink(7)

2021-06-25 Thread Reuben ua Bríġ
> I wonder why noone implimented such checks like that in the last 30 > years. Might be because it breaks more than it fixes. i cant tell if you are being sarcastic or what it could possibly break or why that would matter when OpenBSD is happy to change even man.conf

Re: mount(8) security and symlink(7)

2021-06-25 Thread Theo de Raadt
Reuben ua Bríġ wrote: > > Probably because testing for the situation would be an unreliable > > race. BTW, you explain the ssh behaviour incorrectly. It does not > > warn. It fails, and refuses to continue. Failure is not permitted > > for the mount system call in this circumstance, and the

Re: mount(8) security and symlink(7)

2021-06-25 Thread Reuben ua Bríġ
> Probably because testing for the situation would be an unreliable > race. BTW, you explain the ssh behaviour incorrectly. It does not > warn. It fails, and refuses to continue. Failure is not permitted > for the mount system call in this circumstance, and the entire path > upwards cannot be

Re: mount(8) security and symlink(7)

2021-06-25 Thread Theo de Raadt
Reuben ua Bríġ wrote: > mount(8) will follow a symlink(7), so obviously it is *very* stupid to > mount under a directory a user other than root has write permission for, > as they could, for example > > rm -rf path > ln -s /etc path > > ? so why doesnt the man page for mount(8)

mount(8) security and symlink(7)

2021-06-25 Thread Reuben ua Bríġ
) warn when a mount is unsafe, like ssh(1) does with ~/.ssh it can be quite tempting to make hotplugd mount thumb drives under the home directory of whoever is at a workstation... obviously the safe way to do it is use symlink(7) *for* security, and make a link to /mnt under the users home

Re: web server security

2021-06-10 Thread Stuart Henderson
On 2021-06-10, Gustavo Rios wrote: > Hi folks! > > I am planning a web serve using openbsd as the os and using php. My > question is: how to avoid any given user from implement an php script that > will read some else file, since everything will run as the web server user > and group ? > > thanks

Re: web server security

2021-06-10 Thread Michael Hekeler
ed by person B. If you want to separate ownership of files then you have to create different users and restrict php from reading directories that it shouldn't. Another advice for 'web server security' is to don't give untrusted users shell access or any write access to your system so you won

web server security

2021-06-09 Thread Gustavo Rios
Hi folks! I am planning a web serve using openbsd as the os and using php. My question is: how to avoid any given user from implement an php script that will read some else file, since everything will run as the web server user and group ? thanks a lot. -- The lion and the tiger may be more

Re: Fwd: rethinking terminal login with security in mind

2021-05-05 Thread Marc Espie
On Wed, May 05, 2021 at 01:44:24AM +0200, Alessandro Pistocchi wrote: > Sorry, my keyboard went crazy and the message was sent incomplete. > > Continuing: normally the entry of username is immediately followed by the > password entry. > However, if the OS is busy for any reason between the two

Fwd: rethinking terminal login with security in mind

2021-05-04 Thread Alessandro Pistocchi
, A -- Forwarded message - From: Alessandro Pistocchi Date: Wed, May 5, 2021 at 1:39 AM Subject: rethinking terminal login with security in mind To: OpenBSD misc Hi all, I am a new user. I have been using openbsd for the last few weeks on a raspberry pi 4. I have used other unix flavours

rethinking terminal login with security in mind

2021-05-04 Thread Alessandro Pistocchi
Hi all, I am a new user. I have been using openbsd for the last few weeks on a raspberry pi 4. I have used other unix flavours in the past. I was wondering, what about changing how echoing of characters work when logging in from the terminal? Every unix I tried, including openbsd, asks for the

Re: Content-Security-Policy makes page render differently

2020-12-18 Thread Allan Streib
Paul Pace writes: > When I load a page from OpenBSD served with relayd and httpd with > Content-Security-Policy set to default-src self, I can see that a basic > HTML page that normally renders with all of the text in the center is > now rendered on the left. When you enable cont

Re: Content-Security-Policy makes page render differently

2020-12-18 Thread Anthony J. Bentley
Paul Pace writes: > When I load a page from OpenBSD served with relayd and httpd with > Content-Security-Policy set to default-src self, I can see that a basic > HTML page that normally renders with all of the text in the center is > now rendered on the left. > > I have this cu

Content-Security-Policy makes page render differently

2020-12-18 Thread Paul Pace
When I load a page from OpenBSD served with relayd and httpd with Content-Security-Policy set to default-src self, I can see that a basic HTML page that normally renders with all of the text in the center is now rendered on the left. I have this currently configured with http://mostlybsd.com

Re: Security & Compliance - A/V

2020-11-27 Thread Diana Eichert
Gack, what a way to screw up my day off. :-) I never thought anyone would refer to DISA STIGs in this mailing list. On Fri, Nov 27, 2020 at 8:12 AM Ed Ahlsen-Girard wrote: > SNIP > I can verify that there is no US Defense Information Systems Agency > (DISA) Security Technical Imple

Re: Security & Compliance - A/V

2020-11-27 Thread Ed Ahlsen-Girard
> answers by reading OpenBSD documentation with your lists of > requirements in hand, checking off on your list (if any) as you go > along. I can verify that there is no US Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) for OpenBSD. There is a gene

Re: Security & Compliance - A/V

2020-11-27 Thread Ed Ahlsen-Girard
On Thu, 26 Nov 2020 11:35:45 -0500 Nick Holland wrote: > On 2020-11-25 17:10, Brogan Beard wrote: > [...] > > Something to consider: run the AV against your boxes -- elsewhere! > > I have a similar situation at $DAYJOB. Not OpenBSD, but an OS that > similarly has little malware written for

Re: Security & Compliance - A/V

2020-11-26 Thread Jacqueline Jolicoeur
al content with something like mtree(8) output verified with signify(1), running in security(8) daily.

Re: Security & Compliance - A/V

2020-11-26 Thread Nick Holland
On 2020-11-25 17:10, Brogan Beard wrote: > In the enterprise context, there are often extensive security compliance > rules, which include but are not limited to anti-virus software > requirements. There are, of course, exceptions to these rules but generally > policies drive the techn

Re: Security & Compliance - A/V

2020-11-25 Thread Brogan Beard
audit requirements... > > On Wed, Nov 25, 2020 at 3:23 PM Brogan Beard > wrote: > > > > In the enterprise context, there are often extensive security compliance > > rules, which include but are not limited to anti-virus software > > requirements. There ar

Re: Security & Compliance - A/V

2020-11-25 Thread Brogan Beard
appreciate you taking the time to respond to my questions. Take care, Brogan On Wed, Nov 25, 2020 at 5:33 PM Peter Nicolai Mathias Hansteen < pe...@bsdly.net> wrote: > > > 25. nov. 2020 kl. 23:10 skrev Brogan Beard : > > In the enterprise context, there are often extensiv

Re: Security & Compliance - A/V

2020-11-25 Thread John McGuigan
I've seen people install ClamAV on an OpenBSD box and have it do a filesystem scan on a cron job just to meet audit requirements... On Wed, Nov 25, 2020 at 3:23 PM Brogan Beard wrote: > > In the enterprise context, there are often extensive security compliance > rules, whic

Re: Security & Compliance - A/V

2020-11-25 Thread Peter Nicolai Mathias Hansteen
> 25. nov. 2020 kl. 23:10 skrev Brogan Beard : > > In the enterprise context, there are often extensive security compliance > rules, which include but are not limited to anti-virus software > requirements. There are, of course, exceptions to these rules but generally &

  1   2   3   4   5   6   7   8   9   10   >