Ed,

Would you feel better setting aside your winter instead of summer?

We operate an open/transparent organization. Your shell-based
mission-critical tasks are trapped inside your shell. Putting them in a
CI would do everyone a world of good, so that others can contribute to
your enjoyment of summer.

I do agree that you are ill-informed. What we're doing here is not
ultra-security, as you refer to it. What we are doing is on page 2 of
the "Running a server on the Internets 101" book that was published in 1992.

And you're right - Jenkins vs. shell is not much better. The new Jiro
(on Kubernetes) is.

Matt has been doing some digging and I believe has some potential
workarounds for yourself, and Markus.  Stay tuned.

Thanks for understanding,


Denis



On 2019-08-27 2:26 p.m., Ed Merks wrote:
>
> Denis,
>
> Comments below.
>
> On 27.08.2019 19:27, Denis Roy wrote:
>>
>> Ed,
>>
>> I think we're one of the last shops on earth that has SSH shell
>> access right into our mission-critical infra.
>>
> Being able to use vi in my home folder doesn't strike me as treading
> into your mission-critical infrastructure, but hey, I'm clearly not
> well-informed.  I must point out though that like Markus, I provide
> numerous services that are also mission critical.  But, for the
> greater good of ultra-security, of course I'll quickly set aside my
> summer and my personal life to address, at my own expense, this latest
> pressing security concern inorder to find alternative ways to make
> things work nevertheless. 
>
> But wait, I couldn't do a build for days because Mac signing didn't
> work. Oh, and suddenly today, out of nowhere:
>
> [ERROR] The following artifacts could not be downloaded: [ERROR]
> osgi.bundle,org.bouncycastle.bcprov,1.61.0.v20190602-1335 [ERROR]
> Internal error: java.lang.RuntimeException: Some required artifacts
> could not be downloaded. See log output for details. -> [Help 1] My builds 
> fail again for another reason.  In the end though, ulta-security waits for no 
> person.
>>
>> Even before 2009 this practice was pure insanity from a data/systems
>> security perspective but it was maintained as there were not many
>> options.
>>
> Really? File access permissions are so insanely insecure? So if I
> login and delete a file, that's just insane, but when I run my Jenkins
> job to delete that file, it's totally secure and the world is safe. I
> totally don't get it, but as I said, I'm ill-informed.
>
>> With Jenkins per Project (JIPP), there's just no reason to leave a
>> well-known security faux-pas enabled. It's like putting a credit card
>> number on LinkedIn.
>>
> As I assumed, it's all for the greater good. Much like that "It's so
> reassuring that so many people will benefit from that new highway that
> will consume your home and property." On that front, I know I always
> feel so much more secure when I have to agree to yet another cookie
> prompt on a web page.  Thanks EU, I feel like my web experience is
> totally ultra-cookike-secure now.  I just need that highly in-demand
> the-make-the-cookie-go-away app.  And whenever I do anything around
> here where I live now, I have to sign the data security form, that I
> can't read, but must sign nevertheless.  It totally makes me feel like
> my best interests (security) are always the prime concern.
>
>> As I understand it, there were less than 30 people with full shell
>> access. If hundreds of projects don't need it, it's really hard to
>> justify.
>>
> Of course we were given ample opportunity for justification. And of
> course trying to justify insanity would just be proof of insanity.  So
> good for us that there are those who decree that plain insanity is
> something to which we must put and end, immediately, during the
> summer, when of course no one has anything better to do than migrate
> to the new improved ultra-secure non-insane better alternatives: run
> Jenkins jobs for hours trying to do accomplish what you could do in
> minutes with a shell.
>>
>> In the end, we're not here to intentionally piss folks off with
>> useless dogma -- we're here to help. Part of that mission statement
>> is making sure our systems don't suffer a catastrophic
>> compromise/data breach.
>>
> It's feels so much better to be pissed of unintentionally. :-P
>
> Of course your role is to serve the best interests of the community,
> and I feel bad to rag on you because I do feel you are doing your best
> to serve the interests of the community. But it also feels like dogma
> to me, much like the cookie-phobic, ultra-data security madness that
> plagues me at home.
>
>> Perhaps if we better understand what you use the shell for, we can
>> help craft CI jobs which will both a) accomplish the task and b)
>> provide everyone with more visibility into what's going on, as
>> opposed to some cryptic cron job. Feel free to file bugs in Community
>> / Jenkins for the tasks you need assistance with.
>>
>>
> Feel free to open problem reports that we can promptly do nothing
> about.  No, expect nothing and you will not be disappointed.  I will
> try to make due without.
>>
>> Denis
>>
>>
>> On 2019-08-27 12:46 p.m., Ed Merks wrote:
>>>
>>> Matt,
>>>
>>> So in the end, a restricted shell is essentially so crippled as to
>>> be effectively useless, and there exists no actual concrete
>>> "definition" of what, if anything, useful might in reality be
>>> accomplished with a restricted shell.
>>>
>>> I should point out that this is quite different from the impression
>>> that was presented earlier in this process, so I'm disappointed in
>>> how this has been presented and handled.  It feels to me like a
>>> process of decree where there is no recourse:
>>>
>>>   "We've come to claim your property to build a new highway; we're
>>> very sorry that you'll have to move out before the end of October,
>>> but it is for the greater good."
>>>
>>> Regards,
>>> Ed
>>>
>>>
>>> On 27.08.2019 16:44, Matthew Ward wrote:
>>>> Hi Ed,
>>>>
>>>>   The restricted shell was originally created with the goal of
>>>> providing committers a way to interact with the downloads/archive
>>>> filesystems for releng activities, and version control systems
>>>> without providing a general purpose shell.  So naturally the
>>>> command set available leans in that direction(mv,cp,mkdir,git etc).  
>>>>
>>>> We are certainly willing to discuss adding extra commands either
>>>> temporarily or permanently, but I want to make it clear that the
>>>> goal is not to reproduce bash.  
>>>>
>>>> -Matt.
>>>>
>>>>
>>>>
>>>>
>>>> On Mon, Aug 26, 2019 at 9:58 AM Ed Merks <ed.me...@gmail.com
>>>> <mailto:ed.me...@gmail.com>> wrote:
>>>>
>>>>     What will we be able to do in restricted shell?  Using vi is a
>>>>     very basic activity.  I suppose there must be some good reason
>>>>     why that's restricted?  Earlier I was under the impression that
>>>>     such simple things would continue to work, but now I have to
>>>>     wonder.  But then it was mentioned that things we discover
>>>>     needed could become unrestricted...
>>>>
>>>>
>>>>     On 26.08.2019 15:35, Matthew Ward wrote:
>>>>>     Hi David,
>>>>>
>>>>>       Thanks for the questions.   
>>>>>
>>>>>     Users with the restricted shell will have the same home
>>>>>     directories that they do currently, which will remain the
>>>>>     place for authorized keys.   You won't be able to
>>>>>     edit(vi/emacs/ed) files directly within the restricted shell,
>>>>>     so you will need to upload them via scp/rsync.  If you want a
>>>>>     more 'interactive' type of access I'd suggest looking into
>>>>>     using libfuse, and specifically the sshfs file system.
>>>>>
>>>>>     The restricted shell allows rsync, so there should be zero
>>>>>     impact.  If you'd like to test in advance, drop me a line and
>>>>>     I'll set you up.
>>>>>
>>>>>     -Matt.
>>>>>
>>>>>     On Sat, Aug 24, 2019 at 3:23 PM David Williams
>>>>>     <david_willi...@acm.org <mailto:david_willi...@acm.org>> wrote:
>>>>>
>>>>>         On 8/23/19 14:24, Matthew Ward wrote:
>>>>>>         Hi Everyone,
>>>>>>
>>>>>>           I just wanted to follow up with a reminder that on
>>>>>>         August 28th we will be moving committers that have an
>>>>>>         actual shell on Eclipse.org to our restricted shell.
>>>>>>
>>>>>>         I'd like to thank both Donat and Etienne on the Buildship
>>>>>>         RelEng team who volunteered to test this change, and
>>>>>>         helped me confirm that this change should be minimally
>>>>>>         disruptive.
>>>>>>
>>>>>>         If you have any questions, please let me know.
>>>>>>
>>>>>>         -Matt.
>>>>>>
>>>>>
>>>>>         Thanks for the reminder.
>>>>>
>>>>>         Will those of use that still want to use 'scp' and similar
>>>>>         still have a 'home directory' (on "build"?) and is that
>>>>>         still the place for .ssh/authorized_keys2? Or, does all
>>>>>         that change with "restricted shell"?
>>>>>
>>>>>         If a change, can you point me to instructions on how to
>>>>>         set that up? I would assume some form of "ssh-copy-id
>>>>>         hostname" but thought best not to assume and ask explicitly.
>>>>>
>>>>>         In case you are wondering, the use case, for using scp and
>>>>>         similar is to download a number of builds to my local
>>>>>         machine (without going through web interfaces).
>>>>>         Now that I think of it, I currently use rsync via ssh,
>>>>>         such as
>>>>>
>>>>>          rsync -a -e ssh ${committer_id}@build.eclipse.org:$
>>>>>         <mailto:committer_id...@build.eclipse.org:$>{dlpath}
>>>>>         "${output_dir}"
>>>>>
>>>>>         Will that still work with a restricted shell? Or, will I
>>>>>         need to convert to "scp"?
>>>>>
>>>>>         Thanks,
>>>>>
>>>>>
>>>>>         _______________________________________________
>>>>>         cross-project-issues-dev mailing list
>>>>>         cross-project-issues-dev@eclipse.org
>>>>>         <mailto:cross-project-issues-dev@eclipse.org>
>>>>>         To change your delivery options, retrieve your password,
>>>>>         or unsubscribe from this list, visit
>>>>>         https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>>>
>>>>>
>>>>>     _______________________________________________
>>>>>     cross-project-issues-dev mailing list
>>>>>     cross-project-issues-dev@eclipse.org 
>>>>> <mailto:cross-project-issues-dev@eclipse.org>
>>>>>     To change your delivery options, retrieve your password, or 
>>>>> unsubscribe from this list, visit
>>>>>     https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>>     _______________________________________________
>>>>     cross-project-issues-dev mailing list
>>>>     cross-project-issues-dev@eclipse.org
>>>>     <mailto:cross-project-issues-dev@eclipse.org>
>>>>     To change your delivery options, retrieve your password, or
>>>>     unsubscribe from this list, visit
>>>>     https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>>
>>>>
>>>> _______________________________________________
>>>> cross-project-issues-dev mailing list
>>>> cross-project-issues-dev@eclipse.org
>>>> To change your delivery options, retrieve your password, or unsubscribe 
>>>> from this list, visit
>>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>
>>> _______________________________________________
>>> cross-project-issues-dev mailing list
>>> cross-project-issues-dev@eclipse.org
>>> To change your delivery options, retrieve your password, or unsubscribe 
>>> from this list, visit
>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>
>> _______________________________________________
>> cross-project-issues-dev mailing list
>> cross-project-issues-dev@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe from 
>> this list, visit
>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>
> _______________________________________________
> cross-project-issues-dev mailing list
> cross-project-issues-dev@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe from 
> this list, visit
> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
_______________________________________________
cross-project-issues-dev mailing list
cross-project-issues-dev@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev

Reply via email to