Re: could you add this feature or discuss it at 13.04 Developer Summit?

2012-10-17 Thread Nicolas Michel
I think what Brian wants (correct me if not) is an application level firewall. On Windows most antivirus do it : you get a popup when an application try to access something you didn't already allowed to. I think what should be done is an AppArmor graphical frontend (with notifications). Some

Re: could you add this feature or discuss it at 13.04 Developer Summit?

2012-10-17 Thread Ma Xiaojun
On Wed, Oct 17, 2012 at 1:23 AM, Nicolas Michel be.nicolas.mic...@gmail.com wrote: In consequence, all applications that you install from the Ubuntu Software center are considered safe by the distribution maintainers because they or others members of the open-source community already reviewed

Re: DNS caching disabled for 12.10...still

2012-10-17 Thread Colin Watson
On Sun, Oct 07, 2012 at 01:13:14PM -1000, Paul Graydon wrote: If DNS caching is being disabled in dnsmasq, what value is being had from using dnsmasq by default with network connections? Seems like it just presents another potential failure point. For example, it allows changing nameservers

Re: DNS caching disabled for 12.10...still

2012-10-17 Thread Benjamin Kerensa
On Wed, Oct 17, 2012 at 12:59 AM, Jordon Bedwell jor...@envygeeks.comwrote: On Tue, Oct 16, 2012 at 3:27 PM, Colin Watson cjwat...@ubuntu.com wrote: For example, it allows changing nameservers reliably without having to restart applications, and allows us to dispatch DNS queries on different

Re: could you add this feature or discuss it at 13.04 Developer Summit?

2012-10-17 Thread Nicolas Michel
Brian, Continuing to search, I found the exact app you were searching for and the last version is pretty recent (feb 2012) : http://sourceforge.net/projects/leopardflower/files/ It logs access and can restrict app access to the network. But I never tryied it. Regards, Nicolas 2012/10/17 Ma

Re: DNS caching disabled for 12.10...still

2012-10-17 Thread Daniel J Blueman
On 17 October 2012 16:18, Benjamin Kerensa bkere...@ubuntu.com wrote: On Wed, Oct 17, 2012 at 12:59 AM, Jordon Bedwell jor...@envygeeks.com On Tue, Oct 16, 2012 at 3:27 PM, Colin Watson cjwat...@ubuntu.com wrote: For example, it allows changing nameservers reliably without having to restart

Re: DNS caching disabled for 12.10...still

2012-10-17 Thread Marc Deslauriers
On 12-10-17 04:34 AM, Daniel J Blueman wrote: On 17 October 2012 16:18, Benjamin Kerensa bkere...@ubuntu.com wrote: On Wed, Oct 17, 2012 at 12:59 AM, Jordon Bedwell jor...@envygeeks.com On Tue, Oct 16, 2012 at 3:27 PM, Colin Watson cjwat...@ubuntu.com wrote: For example, it allows changing

Default group

2012-10-17 Thread John Moser
Currently each Ubuntu user gets his own group, so: jsmith:jsmith lmanning:lmanning rpaul:rpaul and so on. I feel this is a lot of clutter for no benefit. First let's discuss the benefit. Since each user has his own group, the administrator can grant other users access to each others' files in

Re: Default group

2012-10-17 Thread Jordon Bedwell
On Wed, Oct 17, 2012 at 8:59 AM, John Moser john.r.mo...@gmail.com wrote: I suggest all users should go into group 'users' as the default group, with $HOME default to 700 and in the group 'users'. A umask of 027 or the traditional 022 is still viable: the files in $HOME are not visible

Re: Default group

2012-10-17 Thread John Moser
On Wed, Oct 17, 2012 at 10:05 AM, Jordon Bedwell jor...@envygeeks.com wrote: The problem with this is how are you going to fix permissions on bad software like Ruby Gems who do not reset permissions when packaging and uploading to the public repository (because they claim this would violate

pam-tmpdir promote to main?

2012-10-17 Thread John Moser
Can we promote pam-tmpdir to main instead of universe for 13.04? It seems to work pretty well now, and so I recommend activating it by default early in the development cycle. Very early. Like first change early: pam-tmpdir is part of the base system default install. The rationale for this is

Re: Default group

2012-10-17 Thread Marc Deslauriers
On 12-10-17 09:59 AM, John Moser wrote: I suggest all users should go into group 'users' as the default group, with $HOME default to 700 and in the group 'users'. A umask of 027 or the traditional 022 is still viable: the files in $HOME are not visible because you cannot list the contents of

Re: Default group

2012-10-17 Thread Alberto Gonzalez
To modify the groups a user is in, you must have administrative access You can use gpasswd -A to delegate group administration to a non-superuser. And the main reason of User Private Group (UPG) is that makes it easy to create directories for collaboration. 2012/10/17 John Moser

Re: pam-tmpdir promote to main?

2012-10-17 Thread Marc Deslauriers
On 12-10-17 10:19 AM, John Moser wrote: Can we promote pam-tmpdir to main instead of universe for 13.04? It seems to work pretty well now, and so I recommend activating it by default early in the development cycle. Very early. Like first change early: pam-tmpdir is part of the base system

Re: Default group

2012-10-17 Thread John Moser
On Wed, Oct 17, 2012 at 10:44 AM, Marc Deslauriers marc.deslauri...@canonical.com wrote: On 12-10-17 09:59 AM, John Moser wrote: I suggest all users should go into group 'users' as the default group, with $HOME default to 700 and in the group 'users'. A umask of 027 or the traditional 022 is

Re: pam-tmpdir promote to main?

2012-10-17 Thread John Moser
On Wed, Oct 17, 2012 at 10:52 AM, Marc Deslauriers marc.deslauri...@canonical.com wrote: Now that we have symlink restrictions in Ubuntu, security issues with using the /tmp directory are greatly reduced. Since Quantal now sets $XDG_RUNTIME_DIR, apps should use it or one of the other $XDG_*

Re: Default group

2012-10-17 Thread Nicolas Michel
John, Do you know KISS http://en.wikipedia.org/wiki/Unix_philosophy#Eric_Raymond ? So ACL works well. But it's really more complicated to use than UGO and surely to understand who has which access to what. Trust me it can be really hard to get it with complex configurations. So I would say : why

Re: Default group

2012-10-17 Thread John Moser
First: that's why we need an interface that handles POSIX ACLs properly, long-overdue. Second, this is not simple. This is a recommendation to use shotgun approach to everything and leave gaping holes because it's convenient. I don't mean to say this is a critical 100% immediate security hole;

Re: Default group

2012-10-17 Thread John Moser
On Wed, Oct 17, 2012 at 3:52 PM, John Moser john.r.mo...@gmail.com wrote: First: that's why we need an interface that handles POSIX ACLs properly, long-overdue. It actually occurs to me that this is probably not just technically important, but important for planning purposes. That is, we can

Re: Default group

2012-10-17 Thread Matt Wheeler
It's called eiciel -- Matt Wheeler m...@funkyhat.org On 17 Oct 2012 21:15, John Moser john.r.mo...@gmail.com wrote: On Wed, Oct 17, 2012 at 3:52 PM, John Moser john.r.mo...@gmail.com wrote: First: that's why we need an interface that handles POSIX ACLs properly, long-overdue. It

Re: Default group

2012-10-17 Thread Marc Deslauriers
On 12-10-17 03:52 PM, John Moser wrote: Let's first assume we have three users: jkirk ksingh wriker Now, let's say any of these wants to give any of the others access to his files in general (i.e. his $HOME). Let's for our example say jkirk wants wriker to have access. First, he

Re: Default group

2012-10-17 Thread John Moser
Doesn't look integrated into the default UI. Workable, but not quite intuitive. Things I'd prefer: - Shows the user and group ownership, instead of piling them is as just part of the ACL. Remember these have special meanings for SUID/SGID. - First three ACL entries are always Owner,

Re: Default group

2012-10-17 Thread John Moser
On 10/17/2012 05:34 PM, Marc Deslauriers wrote: On 12-10-17 03:52 PM, John Moser wrote: First, he must find the sysadmin. The sysadmin must then put wriker in group jkirk. Also, ~jkirk must be group-readable, as must any files. In a default Ubuntu installation, jkirk's files are already

Re: Default group

2012-10-17 Thread Marc Deslauriers
On 12-10-17 05:45 PM, John Moser wrote: On 10/17/2012 05:34 PM, Marc Deslauriers wrote: On 12-10-17 03:52 PM, John Moser wrote: First, he must find the sysadmin. The sysadmin must then put wriker in group jkirk. Also, ~jkirk must be group-readable, as must any files. In a default

Re: Default group

2012-10-17 Thread John Moser
On 10/17/2012 06:43 PM, Marc Deslauriers wrote: On 12-10-17 05:45 PM, John Moser wrote: On 10/17/2012 05:34 PM, Marc Deslauriers wrote: On 12-10-17 03:52 PM, John Moser wrote: First, he must find the sysadmin. The sysadmin must then put wriker in group jkirk. Also, ~jkirk must be