On Sun, Mar 10, 2019 at 08:20:58PM +0100, Oliver Runge wrote:
> On Sun, 10 Mar 2019 at 20:01, Oswald Buddenhagen <oswald.buddenha...@gmx.de> 
> wrote:
> > in principle it would be possible to do just that with a custom
> > mbsync-keychain-client tool.
> 
> Yes, I considered that initially. But if I wanted to do a proper
> solution, then I'd need to look at the content of the binary of the
> parent process, store that somewhere in a secure manner (or hardcode
> it in), to avoid someone just running an imposter parent.  And once
> any parent tool is updated the tool would need updating as well, I'd
> have to implement a lot of what Keychain already does well.
> 
no need to go overboard like that. just establish that the calling
process is in the same directory as the helper. that guarantees that
whoever installed it had the permissions to install both (for any
location a user that can be still helped would approve in the keychain
confirmation dialog).

note that all this stuff makes no sense whatsoever on a "regular"
unix/linux system, as it all runs in the context of the same user. but i
suppose that with properly set up apparmor/selinux/whatever the
execution contexts might be sufficiently isolated for this to actually
improve security.

on an unrelated note, it occurred to me that i don't like the automatic
fallback you implemented - many users script the invocation, so you want
it to fail hard if the configuration doesn't work (anymore), rather than
suddenly asking for a password.


_______________________________________________
isync-devel mailing list
isync-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/isync-devel

Reply via email to