Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Corey
On Wednesday 05 August 2009 19:42:54 Anthony Sorace wrote:
  /sys/log/cron: rc (cpurc): can't open: 'sys/log/cron' is a directory
 
  ... not quite sure what to make of that.

 that's weird. it shouldn't be a directory, just an append-only file
 like most of the others in /sys/log. not sure how it got directoried.
 remove and replace.


Easy enough!


  * Could anyone explain or tell me where I can find more information
  regarding what all is going on with the following:
 
con -l /srv/fscons
snip
 /srv/fscons is the conventional location for you fossil console; see
 fossilcons(8) for more information, including what uname, fsys, and
 create do.


Aha - thanks, I was looking at fs(8) -- which wasn't helping me.


  * At one point I created a new user with 'auth/changeuser' that I didn't
  need/want. What's the suggested means of removing this user?

 see keyfs(4). remove the directory.


Works like a charm.  Knowing the the correct manual page(s) to be looking
at certainly helps!  grin

I can't help though but be curious as to why there's no command, or
an additional switch to changeuser, to remove users from the keyfile.
I guess due to Plan 9's simplicity motto?


  * Similarly to the question above, how should I delete a user created
  with uname via fscons?

 you may or may not realize this, but it's sometimes non-obvious: users
 on the auth server are different from users on a file server, and they
 don't need to be the same (depending on what you want). changeuser and
 keyfs work on the auth server; anything done on fossil's console
 (/srv/fscons) is on the file server. again, see fossilcons(8).


Thanks, yes I was aware (superficially) that there was a difference between
users on the auth server and users on the file server.

I read through fossilcons(8) though, and I'm still not sure how to delete
a filesystem user. I almost got the impression that it's not possible -
due to the mention that Once an id is used in file system structures
archived to Venti, it is impossible to change those disk structures, and
thus impossible to rename the id; but reading on, I guess to remove
a user, I just need to manually edit the user table? Will it hose things if
I edit /adm/users directly, from a shell, rather than executing 
'users [ -r file ]' on /srv/fscons?

Again, it's seems lacking that there isn't simply a 'uname -name'  switch.
(I'm not complaining, just bewildered.)


  * I hope I don't get beat up on this one (well, I hope I don't get too
  beat up on _any_ of these questions...), but it seems strange that
  something as important as a cpu/auth server would just go and boot up
  right into the hostowner... apparently this a non issue - so what am I
  not understanding?

 philosophy. plan9, like research unix before it, recognizes that if
 you have physical access to the box, all bets are off anyway. 


Well, sounds like a flawed philosophy taken too far.

Flawed, because all bets are not necessarily off with physical access;
and taken too far, because... dang, what harm is there in providing
that last means of interference to a hostile?

Cpu/Fs/Auth server says: If you can touch me, I'm _all_ yours...

What a fascinatingly... loose... form of security, if you catch my drift.


 security consists of locking your door.


... which means bootes is just a quick hacksaw or boltcutter or
crowbar away... so why even bother with a locked door? 

Security is ultimately about the price/time/effort/skills a potential 
attacker (or vandal) is willing (and able) to put forth in order to overcome 
a system's security measures. A password is amazingly effective for a
vast number of the most common circumstances encountered in many
typical environments.

Anyhow... I guess there's no reason to argue/debate! Looks like I
have some options:

 if you really, really need to get around that, you have a few options.
 the closest to out of the box is to install and run a screen locker;
 a few people have written those, although i'm not entirely certain any
 are current. more ambitiously, there was a 3rd edition patch to detach
 the console devices from the cpu server itself, asking for login and
 treating it as an attached terminal. those are assuredly out of date,
 but if you really need the functionality, that's where to start.

 alternately, just run something on the console that doesn't have a
 quit function. the console doesn't have interrupt functionality.


Thanks for the suggestions! 

That 3rd ed. detached console devices patch seems to be the best path,
but probably the least trivial.


Cheers,

Corey




Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread John Floren
On Wed, Aug 5, 2009 at 11:15 PM, Coreyco...@bitworthy.net wrote:
 On Wednesday 05 August 2009 19:42:54 Anthony Sorace wrote:
  * I hope I don't get beat up on this one (well, I hope I don't get too
  beat up on _any_ of these questions...), but it seems strange that
  something as important as a cpu/auth server would just go and boot up
  right into the hostowner... apparently this a non issue - so what am I
  not understanding?

 philosophy. plan9, like research unix before it, recognizes that if
 you have physical access to the box, all bets are off anyway.


 Well, sounds like a flawed philosophy taken too far.

 Flawed, because all bets are not necessarily off with physical access;
 and taken too far, because... dang, what harm is there in providing
 that last means of interference to a hostile?

 Cpu/Fs/Auth server says: If you can touch me, I'm _all_ yours...

 What a fascinatingly... loose... form of security, if you catch my drift.


 security consists of locking your door.


 ... which means bootes is just a quick hacksaw or boltcutter or
 crowbar away... so why even bother with a locked door?

 Security is ultimately about the price/time/effort/skills a potential
 attacker (or vandal) is willing (and able) to put forth in order to overcome
 a system's security measures. A password is amazingly effective for a
 vast number of the most common circumstances encountered in many
 typical environments.


I argued this once too, but eventually came around to the Plan 9 way
of thinking. Once you have physical access to the machine, it's yours
anyway. Just boot the Plan 9 CD and mount the fossil or any of the
other possibilities that arise when you are able to physically insert
bootable media into a system and force it to reboot.

If your Linux system is sitting out, oh no, there's a big scary login
prompt! First thing I try is rebooting and adding single to the end
of the kernel options. If that doesn't work, I grab a bootable Linux
CD, boot it, and mount your filesystem. Unless you're encrypting the
disk (probability: low), it's all mine now.

I don't remember the procedure, but I'm pretty sure VMS (reputedly one
of the most secure OSes, if not the most secure OS, in use today) has
a similar option for bypassing the console password on boot, and of
course you can always steal the disk and take it elsewhere, mount a
new boot tape, etc.


John
-- 
Object-oriented design is the roman numerals of computing -- Rob Pike



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Corey

I imagine this is probably a subject full of landmines, so I don't want to
start a war!  I won't press the issue, just want to respond to this, and
then I'll just leave the status quo well enough alone.

I respect those opinions which differ from my own.

On Wednesday 05 August 2009 23:30:38 John Floren wrote:
 On Wed, Aug 5, 2009 at 11:15 PM, Coreyco...@bitworthy.net wrote:
  On Wednesday 05 August 2009 19:42:54 Anthony Sorace wrote:
  philosophy. plan9, like research unix before it, recognizes that if
  you have physical access to the box, all bets are off anyway.
 
  Well, sounds like a flawed philosophy taken too far.
 
  Flawed, because all bets are not necessarily off with physical access;
  and taken too far, because... dang, what harm is there in providing
  that last means of interference to a hostile?
 
snip
  security consists of locking your door.
 
  ... which means bootes is just a quick hacksaw or boltcutter or
  crowbar away... so why even bother with a locked door?
 

That wasn't a rhetorical question.  Why bother locking your door?

Any intruder worth his weight in salt can circumvent such a simple
security mechanism with ease.


  Security is ultimately about the price/time/effort/skills a potential
  attacker (or vandal) is willing (and able) to put forth in order to
  overcome a system's security measures. A password is amazingly effective
  for a vast number of the most common circumstances encountered in many
  typical environments.

 I argued this once too, but eventually came around to the Plan 9 way
 of thinking. 


( I'm going to repeat what I've already written to someone else offlist )

The Plan 9 way of thinking (wrt the security of physical terminal access)
completely undermines, or somehow fails to recognize, the very real fact that
there is always a cost/risk effort/reward equation at play.

Out of X number of would-be intruders, only a small fraction of those would,
under most circumstances, have the balls and the time to dismantle the server
without being noticed; versus all those who would (perhaps even out of sheer
curiosity/mischievousness) love to get quick and easy, unauthorized access to
an open terminal for a quick opportunistic, low-risk look-see, or to play
around, or to simply outright f*ck sh*t up and bail.

Fact is... I would _rather_ force that rare motivated and prepared intruder
into taking down the box... sheesh, at least I'd be alerted that something
went wrong rather quickly. Versus having some ghost in the shell merrily have
his way with the system for a period of time.

It's weird, it seems so obvious.  Passwords help with security. Anyone who 
relies on them too heavily is being foolish; but regardless - they're most
certainly a useful and proven preventative measure to a vast majority of
likely potential situations.


 Once you have physical access to the machine, it's yours
 anyway. Just boot the Plan 9 CD and mount the fossil or any of the
 other possibilities that arise when you are able to physically insert
 bootable media into a system and force it to reboot.


This assumes that:

1 - the intruder came prepared with a Plan 9 disk

2 - the machine in question does in fact have a cdrom/floppy attached


So I say again:  whenever you happen to find yourself with physical
access to any given computer, it is _not_necessarily_ yours. There
are a large number of circumstantial situations that are most often
than not likely to make the dismantling of the machine a much higher
risk operation. In all those situations, where a screw driver simply is
not an option - boy oh boy what fun can be had with a wide open
terminal... it's practically begging you to mess around; even if just
for a quick couple of minutes before you bugger off. However, it is
_certainly_ yours if it's a total no-brainer to simply start entering 
commands as a privileged user.


 If your Linux system is sitting out, oh no, there's a big scary login
 prompt! First thing I try is rebooting and adding single to the end
 of the kernel options. If that doesn't work, I grab a bootable Linux
 CD, boot it, and mount your filesystem. Unless you're encrypting the
 disk (probability: low), it's all mine now.


We're talking Plan 9, not *nix.

Anyhow - whatever!  I can only imagine this has already been gone through
before; and it's not going to make me stop using Plan 9 even though I
think it's absurd.  (c8=


Regards!

Corey



[9fans] searchfs

2009-08-06 Thread Daniel Lyons
I googled around and haven't found anything, but I notice there is a  
file /sys/src/cmd/aux/searchfs.c, and a corresponding binary aux/ 
searchfs. The code doesn't seem to explain what it does very well but  
it piqued my curiosity.


What's this do and how is it intended to be used? I don't know exactly  
what it wants for a database; I tried using /lib/words and it didn't  
blow up but I'm not sure that's what it needs. I found the /search  
file will accept strings like 'search=word' but it doesn't seem to  
have an effect in the filesystem, nor does reading from it produce  
anything.


Any pointers on how to use this? Or is it defunct or some kind of dead  
end?


Thanks,

—
Daniel Lyons




Re: [9fans] Intel atom motherboard - success at last

2009-08-06 Thread Nick LaForge
 This one still has a fan. Is there anything decent *and* fanless out
 there?

 Thanks,
 Roman.

Intel's 'netbook' platform (no amd64) -- fanless, uses a 12V DC brick
-- for mini-itx:

http://www.intel.com/products/desktop/motherboards/D945GSEJT/D945GSEJT-overview.htm

Nick



Re: [9fans] USB HDD connection problem

2009-08-06 Thread Bela Valek
Forgot to mention, I tried to start /boot/usbd manually, i got error
messages, it said that the epX.Y and port numbers are busy or
something (i dont have the exact error message here, sorry).

2009/8/5 Francisco J Ballesteros n...@lsub.org:
 It seems you dont have usbd running.

 El 05/08/2009, a las 17:51, bval...@gmail.com escribió:

 Hi,

 I have a problem with connecting USB HDD. When i plug it in, i get
 this error message: /boot/usbd: /dev/usb/ep5.0: port 8: opendev: can't
 open endpoint /dev/usb/ep7.0: '/dev/usb' file does not exist
 I get this after several other tries too, only the ep-number and the
 port are varied.

 - usb/disk gives this:
 usb/disk: /dev/usb: no devs

 - usbfat: writes:
 mount: can't open /srv/usb: '/srv/usb' file does not exist
 cannot mount /srv/usb

 The USB mouse works.

 Greetings: Béla

 [/mail/box/nemo/msgs/200908/45693]





Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Robert Raschke
On Thu, Aug 6, 2009 at 8:52 AM, Corey co...@bitworthy.net wrote:


 I imagine this is probably a subject full of landmines, so I don't want to
 start a war!  I won't press the issue, just want to respond to this, and
 then I'll just leave the status quo well enough alone.

 I respect those opinions which differ from my own.

 On Wednesday 05 August 2009 23:30:38 John Floren wrote:
  On Wed, Aug 5, 2009 at 11:15 PM, Coreyco...@bitworthy.net wrote:
   On Wednesday 05 August 2009 19:42:54 Anthony Sorace wrote:
   philosophy. plan9, like research unix before it, recognizes that if
   you have physical access to the box, all bets are off anyway.
  
   Well, sounds like a flawed philosophy taken too far.
  
   Flawed, because all bets are not necessarily off with physical access;
   and taken too far, because... dang, what harm is there in providing
   that last means of interference to a hostile?
  
 snip
   security consists of locking your door.
  
   ... which means bootes is just a quick hacksaw or boltcutter or
   crowbar away... so why even bother with a locked door?
  

 That wasn't a rhetorical question.  Why bother locking your door?

 Any intruder worth his weight in salt can circumvent such a simple
 security mechanism with ease.


Why lock your door, when you're living in a gated community?

I think the bit you are leaving out is the fact that a proper Plan 9
installation needs terminals.

Your cpu/auth/filesystem machines can be somewhere safe, with as much
physical safety as you need (physical barriers are much easier to set up and
administer that electronic ones). If all is set up properly, you will never
have to touch those machines again. Unless the machines break and you need
to look at the hardware.

Your terminal, on the other hand is ephemeral and you have go through the
usual security checks if you want to access your cpu and filesystem servers.

Robby


Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Steve Simon
I cannot imageine the senario where random people will have access
to the cpu/auth/file server's consoles. It just doesn't happen
if you are serious about security.

However if you want to protect your console against your friends
I wrote a script to do it /n/sources/contrib/steve/rc/conslock
you may also want to look at screenlock(1)

Incidentially I may use this at home to protect my servers console
against my 2 year old who rather likes keyboards, though this is
a different type of security.

-Steve



Re: [9fans] installation Q

2009-08-06 Thread erik quanstrom
 hi,
 did anyone succeed to install out-of-the-box when target HD is /dev/sdE0, and 
 CD is on /dev/sdE1 ?
 i did not succeed with install on SATA from IDE CD. i ask before i go to buy 
 a SATA DVD.
 i promise to update wiki 'installation' page when i succeed ;-)

yes.  i didn't have any problems with that.
at the boot from prompt, i typed
sdE1!cdboot!9pcflop.gz

- erik



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread erik quanstrom
 Works like a charm.  Knowing the the correct manual page(s) to be looking
 at certainly helps!  grin
 
 I can't help though but be curious as to why there's no command, or
 an additional switch to changeuser, to remove users from the keyfile.
 I guess due to Plan 9's simplicity motto?
[...]
 I read through fossilcons(8) though, and I'm still not sure how to delete
 a filesystem user. I almost got the impression that it's not possible -
 due to the mention that Once an id is used in file system structures
 archived to Venti, it is impossible to change those disk structures, and
 thus impossible to rename the id; but reading on, I guess to remove
 a user, I just need to manually edit the user table? Will it hose things if
 I edit /adm/users directly, from a shell, rather than executing 
 'users [ -r file ]' on /srv/fscons?

the reason there are few provisions for deleting a user, is because that
doesn't make much sense if you have a worm filesystem.  at best you
can remove the user from the active filesystem, but not the dump.

this is the same reason that renaming users is difficult.  (ken's fs
doesn't have this problem since there's a level of indirection between
the name and strictly-internal user id.)

i just disable the user's authentication and make the user's mailbox
unwritable; i've never had a reason to rename a user.

- erik



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread erik quanstrom
 That wasn't a rhetorical question.  Why bother locking your door?

 Any intruder worth his weight in salt can circumvent such a simple
 security mechanism with ease.
[...]
 Out of X number of would-be intruders, only a small fraction of those would,
 under most circumstances, have the balls and the time to dismantle the server
 without being noticed; versus all those who would (perhaps even out of sheer
[...]
 Fact is... I would _rather_ force that rare motivated and prepared intruder
 into taking down the box... sheesh, at least I'd be alerted that something
 went wrong rather quickly. Versus having some ghost in the shell merrily have
 his way with the system for a period of time.
 
 It's weird, it seems so obvious.  Passwords help with security. Anyone who 
 relies on them too heavily is being foolish; but regardless - they're most
 certainly a useful and proven preventative measure to a vast majority of
 likely potential situations.
 
  Once you have physical access to the machine, it's yours
  anyway. Just boot the Plan 9 CD and mount the fossil or any of the
  other possibilities that arise when you are able to physically insert
  bootable media into a system and force it to reboot.
 
 
 This assumes that:
 
 1 - the intruder came prepared with a Plan 9 disk
 
 2 - the machine in question does in fact have a cdrom/floppy attached
 

i think you're arguing three ends against the middle.
if the intruder is willing to break down doors, the intruder
can just take the machines, too.  on the other hand, you
argue that you'd need to be prepared to use a live cd or
whatnot.  but that's just not the case.  you can smash and
grab.  or bring a bootable usb stick and either
erase or copy files.

first step in understanding security is understanding
what the real threats are.  or that failing, what threats
one would like to protect against.

for example, in the office there's a lock and alarm on
the front door, a lock into the suite but there's no
lock on the machine room door, nor the physical
consoles.  this has increased system availablity.
since i've been able to talk people through problems
when i wasn't on site.

sure anyone in the company could go mess with the
fileserver or auth server.  but, that wouldn't be too
smart.  and the sr with the fileserver's storage has
hot swap drives.  it would be easier to hose the fs
by pulling drives than anything else.  great plausable
deniablity.  the disk drives could have gone nuts.  in fact the only
physical security problem we've had was an accident.
somebody pushed the big red button during a machine
move.  demonstrating that it's hard to get to step one
of security: understanding what the real threats are.

by the way, if you want to lock the console, it's not hard
to write such a program.  just do it.

- erik



[9fans] nupas update

2009-08-06 Thread erik quanstrom
i just pushed an update of nupas to sources.
it fixes a few bugs, including
- a recursive sync loop has been eliminated..
(this has been the source of some mystery crashes)
- dualing upas/fs operating on the same mbox
no longer miss deletions.  the fix is less than elegant.

also on 27 jul, a crash with truncated mime sections
was fixed.  it might be that there is still a bug in imap
that caused the original problem.  but it could also
be due to the recursive sync loop.

thanks for the bug reports!

- erik



[9fans] contrib dir

2009-08-06 Thread yy
Hello Geoff,
I wanted to ask you for a directory in sources/contrib. I sent an
email to cont...@plan9.bell-labs.com some time ago, but it looks like
it got lost and some people on #9fans told me to contact with you. I
just want to store there some rio and acme patches I have. Thanks in
advance (and thank you too for keeping sources up!).

Regards,


-- 
- yiyus || JGL . 4l77.com



Re: [9fans] linux reinvents factotum, secstore ...

2009-08-06 Thread Daniel Lyons


On Aug 6, 2009, at 12:13 PM, erik quanstrom wrote:


poorly.  massive, overengineered, and yet lacking:

http://lwn.net/Articles/344117



Ugh.

A brief apology on their behalf, though. I have been trying to  
understand the workings of factotum, secstore, auth/keyfs and whatnot  
for a while and I'm just now starting to get the feeling that I might  
have a grasp on how all these things work together in concert to do  
their jobs.


There is a propensity to develop software starting from the interface  
working backwards to the functionality. When enough people reduplicate  
a functionality, they decide to move the functionality out. This is  
what you're going to get when you evolve software rather than  
architect it. One of the things I have been impressed with in Plan 9  
is that generally each layer of abstraction is comprehensive. On Linux  
there is a tendency to have to keep adding more layers upon the  
layers. This security framework, for example, relies on D-Bus for  
communication. The appearance of hal, the hardware abstraction layer  
a few years ago struck me too. Isn't that what the OS is supposed to  
provide? Maybe it would have been feasible to add whatever it adds if  
more of the drivers were in user space rather than kernel space.


It's easy for me to object to what they're coming up with but it would  
be hard for me to describe in detail how exactly factotum + all the  
other stuff encompass it, and I don't think that the paper we have on  
factotum or the section in nemo's book are sufficient either. As a  
devil's advocate, in my Mac keychain I have 13 keys related to file  
shares and 22 WEP keys. I have my SSH key on 24 machines. Then I have  
270 web form passwords or internet passwords in my keychain. Does  
factotum handle web passwords? I'm presuming not but I don't really  
know because I generally surf with Safari or Firefox outside Plan 9.  
I'm not complaining about the browser situation, I'm just saying, it  
seems to me that the average user probably has more website usernames  
and passwords than everything else combined. That's certainly the case  
with me. Could factotum be adapt to integrate with a browser and store  
web form secrets? If so that would be a compelling objection, since it  
looks like Firefox isn't going to start using their security framework  
anytime soon. And who can blame them? It already has a ton of  
dependencies and porting issues and this can only exacerbate it.


It might raise our profile a bit if someone who has a comprehensive  
understanding of the security framework in Plan 9 would write a  
rebuttal to this announcement, something along the lines of Plan 9:  
An Integrated Approach to Grid Computing by Andrey Mirtchovski, Rob  
Simmonds and Ron Minnich. That paper works largely as a refutation of  
the complexity of the Globus Toolkit. It would also be helpful to  
people like myself who are recent adopters of Plan 9 and don't have a  
comprehensive understanding of the security architecture—perhaps  
because we've been poisoned by systems like Mac OS X Keychain and SSH.


—
Daniel Lyons




Re: [9fans] linux reinvents factotum, secstore ...

2009-08-06 Thread erik quanstrom
 270 web form passwords or internet passwords in my keychain. Does  
 factotum handle web passwords? 

yes, it does.  abaco and hget already use factotum
for http passwords.

 with me. Could factotum be adapt to integrate with a browser and store  
 web form secrets? If so that would be a compelling objection, since it  
 looks like Firefox isn't going to start using their security framework  
 anytime soon. And who can blame them? It already has a ton of  
 dependencies and porting issues and this can only exacerbate it.

sure.  you could integrate factotum and firefox.

- erik



Re: [9fans] contrib dir

2009-08-06 Thread Jason Catena
Hi Geoff,

I would also like to request a directory in sources/contrib, to store
a stream wrapper around sam (ssam), a script which uses mk to
parallelize a command over a set of arguments (apply), a script to
port ksh/bash scripts to rc (torc), et cetera.  Many thanks.

Jason Catena (jdc)



[9fans] 9base-3

2009-08-06 Thread Anselm R Garbe
Hi there,

I revived the 9base project which was asleep for nearly 3 years som
days ago and created a new version based on Russ' plan9port from
20090731. You can download it from:

  http://code.suckless.org/dl/tools/9base-3.tar.gz

its project page can be found at:

  http://tools.suckless.org/9base

and you can also clone it using mercurial as follow:

  hg clone http://hg.suckless.org/9base

Kind regards,
Anselm



Re: [9fans] Intel atom motherboard - success at last

2009-08-06 Thread Fernan Bolando
On Wed, Aug 5, 2009 at 2:43 AM, Steve Simonst...@quintile.net wrote:
 I have had loads of problems trying to build a new machine,
 Erik has helpd way beyond the call of duty, and finally I
 have a working machine.

 The problems where:
        realteck rtl8169 GigE - erik's driver works a treat
        An intermitant PSU - RMA'ed to supplier
        SATA - Eriks new sd driver works nicely
        A PATA DVDRW which devata ignores.

 So, all sorted but now I need an IDE (parallel) DVDRW
 drive which does work. I was going to just buy a Plexstor
 drive as being the reliable name but they seem to be silly money.

 anyone any suggestions?


Hi Steve

Its almost the weekend here and I finally had time to try Eriks iso on
my atom motherboard.
What configuration did you use?

I currently have the follwing
memory 2Gig
sata harddisk 320Gig
ide dvdrw liteon

I went through all the default during the install and during fmtfossil
I got a few

matherror something and it crashed. I t wen too fast for me to take notes.

I tried again and check the defaults that the installer was setting
and decided to diable DMA.
It didn't crash after that, however after letting it sit for 11 Hours
it is still in fmtfossil stage.
I can still the disk activity light so I guess it's still doing fmtfossil.

During the install it gave me the follwing disk prep.
30Gig fossil
24Gig isect
240Gig arenas

I will try send out some more details later.

thanks.
fernan





-- 
http://www.fernski.com



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Corey
On Thursday 06 August 2009 01:19:35 Robert Raschke wrote:
 On Thu, Aug 6, 2009 at 8:52 AM, Corey co...@bitworthy.net wrote:
snip
  That wasn't a rhetorical question.  Why bother locking your door?
 
  Any intruder worth his weight in salt can circumvent such a simple
  security mechanism with ease.

 Why lock your door, when you're living in a gated community?


A few possible answers:

Because I'm convinced that multiple redundant layers of security is
most effective.

Because I _don't_ live in a gated community.

Because anyone can hop a fence, the silly pathetic lock (password) on 
my front door (auth server) is my last line of defense; and it will be
immediately and clearly obvious that someone broke in because... well.. 
they _broke_ in (turned off and dismantled the server)... they didn't
just walk in without further ado (began issuing commands as hostowner
on the open terminal) and leave without immediate and clear evidence 
(no broken/missing case, no powered off server and missing drives, etc)


 Your cpu/auth/filesystem machines can be somewhere safe, with as much
 physical safety as you need (physical barriers are much easier to set up
 and administer that electronic ones). If all is set up properly, you will
 never have to touch those machines again. Unless the machines break and 
 you need to look at the hardware.


Meanwhile, here on terra firma, I would like to be able to have my
Plan 9 servers sitting on a rack in a common affordable co-lo somewhere.


I think the actual root of the situation, is simply that Plan 9 currently
tends to reside within domains with much more strict and secure
or trustworthy environments vs. being prevalent within the sphere of
the great unwashed masses of the industry where strong physical 
security is either unobtainable, unaffordable, and/or unreliable at best.

_Within_such_environments_, simple passwords remain an effective and
proven means of _deterrent_ from the most common, random, unforeseen
encounters that may occur on a near every day situation.


The phone guys have to enter the server room - you trust them with bootes?

Various contractors have to enter the server room - you trust them with
bootes?

The sysadmin forgets to lock the door to the server room before heading
out for lunch - you trust all your visitors, customers, affiliates and
employees with a terminal sitting at a bootes prompt?

The hosting provider has all number of people walking in and out of the
server room constantly, every day - you trust each and every one of these
random unknown people with a bootes prompt to your co-lo'd cpu server?

Now here's the important part -- in each of these cases (those are just a few,
it doesn't take much of an imagination - or much actual experience - to come
up with countless more), the _real_ concern is _not_ over that rare motivated,
focused, risk-taking bad guy with a plan who's come prepared with a
screwdriver and usb rootkit and assorted bootdisks... the concern is all the
ad-hoc opportunistic, curious and/or malicious passer-by's, armed with
nothing more than their fingers, who just might take up the chance to goof
around with that open terminal connected to the server.

I have a much higher level of trust that X person won't walk off with or
dismantle a server vs. the level of trust I have that X person won't execute
commands on an open terminal. It's really quite simple.

If your servers aren't under you direct control, and they're not guaranteed
continually locked behind a bio-metrically secured room under constant video
surveillance - then you don't have physical security. 

If you don't operate within a contained, peer-based trusted environment (lab,
research center, spec. dept., etc), then you don't have physical security.

Most of the industry at large... does _not_ have trusted physical security.

And if you don't have trusted physical security, then an open terminal is 
beyond the pale of recklessness.

Passwords make an excellent form of _additional_deterrent_ under the sort 
of lowest common denominator environment that tends to comprise the
industry at large. (from AnyTec, to Bob's coffee house, to Standford  Son's
automotive repair, to The Law Offices Of Larry H. Parker, to Data Entry Inc.)

I honestly can't believe that this is even up for debate!  grin

It's just bizarre.

 I think the bit you are leaving out is the fact that a proper Plan 9
 installation needs terminals.

 Your terminal, on the other hand is ephemeral and you have go through the
 usual security checks if you want to access your cpu and filesystem
 servers.


That's understood; and I'm well impressed by the way that particular portion
of the model works.


Ok, well I think I've said all I can possible say -- so unless I get any 
direct questions I won't follow up on this; I don't want to annoy the list -
9fans is my only means of assistance for this interesting os - plus, I've
already been provided with solutions from which I can roll my own.


Cheers,

Corey


Re: [9fans] Intel atom motherboard - success at last

2009-08-06 Thread erik quanstrom
 I went through all the default during the install and during fmtfossil
 I got a few
 
 matherror something and it crashed. I t wen too fast for me to take notes.

this is due to the awk problem reported this week.  i'll roll up
another cd this evening.

with ide turned off, you probablly just haven't gotten to the
part where awk dies.

- erik



[9fans] binary sprint format

2009-08-06 Thread Adriano Verardo

Hi, all

I'm trying to convert integers in text binary format by sprint(..., 
%b, i),

but 8c issue a format mismatch b INT warning message.

Can anyone kindly explain  to me my mistake ?
Doesn't   %b  behave like the other integer  format specifications  ?

Thanks in advance

adriano





Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread John Floren
On Thu, Aug 6, 2009 at 4:28 PM, Coreyco...@bitworthy.net wrote:
 On Thursday 06 August 2009 01:19:35 Robert Raschke wrote:
 On Thu, Aug 6, 2009 at 8:52 AM, Corey co...@bitworthy.net wrote:
 snip
  That wasn't a rhetorical question.  Why bother locking your door?
 
  Any intruder worth his weight in salt can circumvent such a simple
  security mechanism with ease.

 Why lock your door, when you're living in a gated community?


 A few possible answers:

 Because I'm convinced that multiple redundant layers of security is
 most effective.

 Because I _don't_ live in a gated community.

 Because anyone can hop a fence, the silly pathetic lock (password) on
 my front door (auth server) is my last line of defense; and it will be
 immediately and clearly obvious that someone broke in because... well..
 they _broke_ in (turned off and dismantled the server)... they didn't
 just walk in without further ado (began issuing commands as hostowner
 on the open terminal) and leave without immediate and clear evidence
 (no broken/missing case, no powered off server and missing drives, etc)


 Your cpu/auth/filesystem machines can be somewhere safe, with as much
 physical safety as you need (physical barriers are much easier to set up
 and administer that electronic ones). If all is set up properly, you will
 never have to touch those machines again. Unless the machines break and
 you need to look at the hardware.


 Meanwhile, here on terra firma, I would like to be able to have my
 Plan 9 servers sitting on a rack in a common affordable co-lo somewhere.


 I think the actual root of the situation, is simply that Plan 9 currently
 tends to reside within domains with much more strict and secure
 or trustworthy environments vs. being prevalent within the sphere of
 the great unwashed masses of the industry where strong physical
 security is either unobtainable, unaffordable, and/or unreliable at best.

 _Within_such_environments_, simple passwords remain an effective and
 proven means of _deterrent_ from the most common, random, unforeseen
 encounters that may occur on a near every day situation.


 The phone guys have to enter the server room - you trust them with bootes?

 Various contractors have to enter the server room - you trust them with
 bootes?

 The sysadmin forgets to lock the door to the server room before heading
 out for lunch - you trust all your visitors, customers, affiliates and
 employees with a terminal sitting at a bootes prompt?

 The hosting provider has all number of people walking in and out of the
 server room constantly, every day - you trust each and every one of these
 random unknown people with a bootes prompt to your co-lo'd cpu server?

 Now here's the important part -- in each of these cases (those are just a few,
 it doesn't take much of an imagination - or much actual experience - to come
 up with countless more), the _real_ concern is _not_ over that rare motivated,
 focused, risk-taking bad guy with a plan who's come prepared with a
 screwdriver and usb rootkit and assorted bootdisks... the concern is all the
 ad-hoc opportunistic, curious and/or malicious passer-by's, armed with
 nothing more than their fingers, who just might take up the chance to goof
 around with that open terminal connected to the server.

 I have a much higher level of trust that X person won't walk off with or
 dismantle a server vs. the level of trust I have that X person won't execute
 commands on an open terminal. It's really quite simple.

 If your servers aren't under you direct control, and they're not guaranteed
 continually locked behind a bio-metrically secured room under constant video
 surveillance - then you don't have physical security.

 If you don't operate within a contained, peer-based trusted environment (lab,
 research center, spec. dept., etc), then you don't have physical security.

 Most of the industry at large... does _not_ have trusted physical security.

 And if you don't have trusted physical security, then an open terminal is
 beyond the pale of recklessness.

 Passwords make an excellent form of _additional_deterrent_ under the sort
 of lowest common denominator environment that tends to comprise the
 industry at large. (from AnyTec, to Bob's coffee house, to Standford  Son's
 automotive repair, to The Law Offices Of Larry H. Parker, to Data Entry Inc.)

 I honestly can't believe that this is even up for debate!  grin

 It's just bizarre.


Oh, if we're just protecting against people wandering by who are
obviously there by mistake--since we're discounting anyone coming
prepared for serious maliciousness--how about just not having a
terminal connected to your file server? My cpu/auth/file servers don't
have anything connected except an ethernet cable and a remote serial
console. Oh, sure, there's a crash cart over in the corner that you
could drag over and plug in, but you've decided that we're only
talking about opportunists who see a prompt and decide to type some
stuff, so it's 

Re: [9fans] binary sprint format

2009-08-06 Thread erik quanstrom
On Thu Aug  6 20:03:20 EDT 2009, a.vera...@tecmav.com wrote:
 Hi, all
 
 I'm trying to convert integers in text binary format by sprint(..., 
 %b, i),
 but 8c issue a format mismatch b INT warning message.
 
 Can anyone kindly explain  to me my mistake ?
 Doesn't   %b  behave like the other integer  format specifications  ?
 
 Thanks in advance

i believe you need to update your libc.h.  you need pragmas for
the b format, which were added 2007/0108.

- erik



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread ron minnich
Short form:

on today's machines, if someone gets physical access, you're owned.
Not much more to say except that with the kind of features vendors
insist on embedding in the systems, you can easily be owned without
physical access -- see the recent Black Hat articles, and I'm not
naming names so I don't get fired. If the colo is doing their job, and
they'd better be!, then physical access is not an issue because it
won't happen, or, when it does happen, the people are trusted and
won't mess with your box.

9grid.net has been at, first, UNM computing center for 2 years and,
second, at LBL for 2 years. In all the time, there have been no
issues. The people at those places are trusted.

If colo staff can't own it by physical access then you've solved a
hard problem and might want to start selling it. In that case, you
need hardly worry about trusting your colo, so put it there anyway.

Screensaver + password seems rather quaint in light of these realities.

ron



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Roman Shaposhnik

On Aug 6, 2009, at 4:47 AM, erik quanstrom wrote:
Works like a charm.  Knowing the the correct manual page(s) to be  
looking

at certainly helps!  grin

I can't help though but be curious as to why there's no command, or
an additional switch to changeuser, to remove users from the keyfile.
I guess due to Plan 9's simplicity motto?

[...]
I read through fossilcons(8) though, and I'm still not sure how to  
delete
a filesystem user. I almost got the impression that it's not  
possible -

due to the mention that Once an id is used in file system structures
archived to Venti, it is impossible to change those disk  
structures, and

thus impossible to rename the id; but reading on, I guess to remove
a user, I just need to manually edit the user table? Will it hose  
things if

I edit /adm/users directly, from a shell, rather than executing
'users [ -r file ]' on /srv/fscons?


the reason there are few provisions for deleting a user, is because  
that

doesn't make much sense if you have a worm filesystem.  at best you
can remove the user from the active filesystem, but not the dump.

this is the same reason that renaming users is difficult.  (ken's fs
doesn't have this problem since there's a level of indirection between
the name and strictly-internal user id.)

i just disable the user's authentication and make the user's mailbox
unwritable; i've never had a reason to rename a user.


It also seems that most of organizations I know have that same kind
of permanency in place even at HR level. If you leave the company
and then get rehired you feel like you've never left -- you badge id
and sorts of HR assigned credentials are simply enabled, not created
anew. Don't know whether this is a function of IT influencing HR
decisions or whether there's an HR reason for doing it that way.

Thanks,
Roman.



Re: [9fans] 9base-3

2009-08-06 Thread Roman Shaposhnik

On Aug 6, 2009, at 1:08 PM, Anselm R Garbe wrote:


Hi there,

I revived the 9base project which was asleep for nearly 3 years som
days ago and created a new version based on Russ' plan9port from
20090731. You can download it from:

 http://code.suckless.org/dl/tools/9base-3.tar.gz

its project page can be found at:

 http://tools.suckless.org/9base

and you can also clone it using mercurial as follow:

 hg clone http://hg.suckless.org/9base


So, is this just a slimmer version of plan9port?

Thanks,
Roman.



Re: [9fans] binary sprint format

2009-08-06 Thread erik quanstrom
  i believe you need to update your libc.h.  you need pragmas for
  the b format, which were added 2007/0108.
 
  - erik
 
 
 

 I'm using a distribution downloaded about 2 months ago. The machine has 
 been installed from scratch.

perhaps you have not included everything necessary?

; cat fmtb.c
#include u.h
#include libc.h

void
main(void)
{
print(%b\n, 16);
exits();
}

; 8c -FVTw fmtb.c  8l fmtb.8  8.out
1

- erik



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Corey
On Thursday 06 August 2009 17:01:30 John Floren wrote:
 On Thu, Aug 6, 2009 at 4:28 PM, Coreyco...@bitworthy.net wrote:
snip
  I honestly can't believe that this is even up for debate!  grin
 
  It's just bizarre.

 Oh, if we're just protecting against people wandering by who are
 obviously there by mistake--since we're discounting anyone coming
 prepared for serious maliciousness--how about just not having a
 terminal connected to your file server?


Ok, that's reasonable. Especially when considering the idea that, 
apparently, once a Plan 9 cpu/auth/fs server has been set up, there's 
no reason to require further periodic access to its terminal.

Removing the Plan 9 server's terminal peripherals is equivalent to - and
follows the same exact line of reasoning for - implementing a password 
for said server's terminal.

i.e. - both techniques increase the level of difficulty and effort and
inconvenience one must suffer through before gaining unauthorized
access to a hostowner prompt.

In light of this, I'm still unconvinced that a terminal password is totally
without merit. At least with a password, I don't force trusted admins
to lug out the peripherals.


 My cpu/auth/file servers don't
 have anything connected except an ethernet cable and a remote serial
 console. Oh, sure, there's a crash cart over in the corner that you
 could drag over and plug in, but you've decided that we're only
 talking about opportunists who see a prompt and decide to type some
 stuff, so it's not a problem.


True.


 The whole friggin' point of a colo is that you trust the people
 running it--


I have direct experience as a contractor where I have entered
many a co-lo; and was unimpressed with their security to say the least.
I had constant and easy access to a large number of nameless servers,
it's a nobrainer to access keyboard/monitor pairs in many of these places.

Interestingly enough - that simple, worthless password prompt is what 
made it effectively impossible to do anything with said servers. It was easy
for me to reach keyboards; but would have been risky and difficult - and
would have had _zero_ plausible deniability - to pop a chassis and snag 
hard drives.


 I have not found a single sign that anyone has so much as touched the
 keyboard, much less done rm -r / or whatever it is you're afraid of.


I'm afraid of all the same things you're afraid of - all the same reasons
why authentication is necessary when accessing the server remotely.

As far as I'm concerned, physical access to the terminal is no different
than remote access. I differentiate between the server's terminal and the
server's chassis, though they are often within reaching distance of each
other. 

To conflate the terminal with the server, as Plan 9 servers apparently
do, is a lazy and unnecessary abstraction in my mind.


 I'm afraid you'll have to forgive me if I find the probability of
 someone improperly accessing your headless colo'd box rather low.

 I invite you, though, to create some form of logging protection system
 for the box. Put the box in a colo, and then in 3 years send us your
 logs. I guess we'll see how many people tried to get into your cpu
 server.


The co-lo situation was just one example. I agree the risk is sleight -
after all, there are _lots_ of servers in a co-lo. So what's the chances
of _mine_ getting abused?

On Thursday 06 August 2009 17:17:19 John Floren wrote:
 A note, please don't take this as a flame. 


Not at all! It's good to hear others experiences and conclusions.


Cheers,

Corey




Re: [9fans] binary sprint format

2009-08-06 Thread Adriano Verardo

erik quanstrom wrote:

On Thu Aug  6 20:03:20 EDT 2009, a.vera...@tecmav.com wrote:
  

Hi, all

I'm trying to convert integers in text binary format by sprint(..., 
%b, i),

but 8c issue a format mismatch b INT warning message.

Can anyone kindly explain  to me my mistake ?
Doesn't   %b  behave like the other integer  format specifications  ?

Thanks in advance



i believe you need to update your libc.h.  you need pragmas for
the b format, which were added 2007/0108.

- erik



  
I'm using a distribution downloaded about 2 months ago. The machine has 
been installed from scratch.


adriano




Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread hiro
don't forget to take away the connectors from the power and reset
buttons, otherwise good security concepts;)



Re: [9fans] binary sprint format

2009-08-06 Thread Adriano Verardo

erik quanstrom wrote:

i believe you need to update your libc.h.  you need pragmas for
the b format, which were added 2007/0108.

- erik



  
  
I'm using a distribution downloaded about 2 months ago. The machine has 
been installed from scratch.



perhaps you have not included everything necessary?

; cat fmtb.c
#include u.h
#include libc.h

void
main(void)
{
print(%b\n, 16);
exits();
}

; 8c -FVTw fmtb.c  8l fmtb.8  8.out
1

- erik

  

Your example works on my machine too.

What could be the reason why 8c complains about sprint(buf, %b, 16) in 
a driver whose includes are:


#include u.h
#include ../port/lib.h
#include mem.h
#include dat.h
#include fns.h

Am I using them in a wrong way ?

adriano



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread blstuart
 It also seems that most of organizations I know have that same kind
 of permanency in place even at HR level. If you leave the company
 and then get rehired you feel like you've never left -- you badge id
 and sorts of HR assigned credentials are simply enabled, not created
 anew. Don't know whether this is a function of IT influencing HR
 decisions or whether there's an HR reason for doing it that way.

That's for sure.  I just started to work for a company that I
did some consulting for about 15 years ago.  It was easier
paperwork to put me in the system as a part-time employee
back then.  So when I started again a few weeks ago, my
employee ID number was still in the system to the surprise
of the HR girl who handled the initial paperwork.

BLS




Re: [9fans] linux reinvents factotum, secstore ...

2009-08-06 Thread Roman Shaposhnik

On Aug 6, 2009, at 11:13 AM, erik quanstrom wrote:

poorly.  massive, overengineered, and yet lacking:

http://lwn.net/Articles/344117


This looks like a case in desperate need of Peter Gutmann's Wave  
Therapy:

 http://diswww.mit.edu/bloom-picayune/crypto/14238

Whenever someone thinks that they can replace SSL/SSH with something  
much
  better that they designed this morning over coffee, their computer  
speakers

  should generate some sort of penis-shaped sound wave and plunge it
  repeatedly into their skulls until they achieve enlightenment.

Thanks,
Roman.




Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread blstuart
 Incidentially I may use this at home to protect my servers console
 against my 2 year old who rather likes keyboards, though this is
 a different type of security.

In that situation, the most important security measure it
to place the power switch at an altitude beyond the little
one's reach.  I speak from experience.  It was just like a
movie; I was moving in slow motion saying noo as
I reached to block the power switch from my daughter's
finger.  I was too late.  Fortunately, I hadn't done too
much since I last saved...

BLS




Re: [9fans] linux reinvents factotum, secstore ...

2009-08-06 Thread Roman Shaposhnik

On Aug 6, 2009, at 12:33 PM, Daniel Lyons wrote:
It's easy for me to object to what they're coming up with but it  
would be hard for me to describe in detail how exactly factotum +  
all the other stuff encompass it, and I don't think that the paper  
we have on factotum or the section in nemo's book are sufficient  
either. As a devil's advocate, in my Mac keychain I have 13 keys  
related to file shares and 22 WEP keys. I have my SSH key on 24  
machines. Then I have 270 web form passwords or internet passwords  
in my keychain. Does factotum handle web passwords? I'm presuming  
not but I don't really know because I generally surf with Safari or  
Firefox outside Plan 9. I'm not complaining about the browser  
situation, I'm just saying, it seems to me that the average user  
probably has more website usernames and passwords than everything  
else combined. That's certainly the case with me. Could factotum be  
adapt to integrate with a browser and store web form secrets? If so  
that would be a compelling objection, since it looks like Firefox  
isn't going to start using their security framework anytime soon.  
And who can blame them? It already has a ton of dependencies and  
porting issues and this can only exacerbate it.


These are reasonable questions (and many of them have yes as the  
answer ;-)) but I have a more
fundamental objection here: the desktop is just NOT the place for such  
a functionality to originate from. The very
concept of a fixed desktop that resides on a physical piece of  
hardware that you own feels so 20th century
to me. One way or the other the online identity issue is going to be  
settled. For contenders, though, I'd

rather look at: factotum or things like OAuth.

I don't think there's a reasonable conversation to be had with folks  
struggling to provide solutions
for taking the pain out of managing plain text passwords. The pain is  
there for a reason.


Thanks,
Roman.



Re: [9fans] Intel atom motherboard - success at last

2009-08-06 Thread Roman Shaposhnik

On Aug 6, 2009, at 1:45 AM, Nick LaForge wrote:

This one still has a fan. Is there anything decent *and* fanless out
there?

Thanks,
Roman.


Intel's 'netbook' platform (no amd64) -- fanless, uses a 12V DC brick
-- for mini-itx:

http://www.intel.com/products/desktop/motherboards/D945GSEJT/D945GSEJT-overview.htm


All good stuff, but is it available for less than $1K though?

Thanks,
Roman.



Re: [9fans] binary sprint format

2009-08-06 Thread Akshat Kumar
 #include u.h
 #include ../port/lib.h
 #include mem.h
 #include dat.h
 #include fns.h

Perhaps libc.h?


ak



Re: [9fans] Intel atom motherboard - success at last

2009-08-06 Thread Tharaneedharan Vilwanathan
Hi Roman,

The price seems to be $118:

http://www.mini-box.com/Intel-D945GSEJT-Mini-ITX-Motherboard

Thanks
dharani

On Thu, Aug 6, 2009 at 7:09 PM, Roman Shaposhnik r...@sun.com wrote:

  On Aug 6, 2009, at 1:45 AM, Nick LaForge wrote:

 This one still has a fan. Is there anything decent *and* fanless out
 there?

 Thanks,
 Roman.


 Intel's 'netbook' platform (no amd64) -- fanless, uses a 12V DC brick
 -- for mini-itx:


 http://www.intel.com/products/desktop/motherboards/D945GSEJT/D945GSEJT-overview.htm


 All good stuff, but is it available for less than $1K though?

 Thanks,
 Roman.




Re: [9fans] linux reinvents factotum, secstore ...

2009-08-06 Thread Daniel Lyons


On Aug 6, 2009, at 7:39 PM, Roman Shaposhnik wrote:


On Aug 6, 2009, at 12:33 PM, Daniel Lyons wrote:
It's easy for me to object to what they're coming up with but it  
would be hard for me to describe in detail how exactly factotum +  
all the other stuff encompass it, and I don't think that the paper  
we have on factotum or the section in nemo's book are sufficient  
either. As a devil's advocate, in my Mac keychain I have 13 keys  
related to file shares and 22 WEP keys. I have my SSH key on 24  
machines. Then I have 270 web form passwords or internet passwords  
in my keychain. Does factotum handle web passwords? I'm presuming  
not but I don't really know because I generally surf with Safari or  
Firefox outside Plan 9. I'm not complaining about the browser  
situation, I'm just saying, it seems to me that the average user  
probably has more website usernames and passwords than everything  
else combined. That's certainly the case with me. Could factotum be  
adapt to integrate with a browser and store web form secrets? If so  
that would be a compelling objection, since it looks like Firefox  
isn't going to start using their security framework anytime soon.  
And who can blame them? It already has a ton of dependencies and  
porting issues and this can only exacerbate it.


These are reasonable questions (and many of them have yes as the  
answer ;-)) but I have a more
fundamental objection here: the desktop is just NOT the place for  
such a functionality to originate from. The very
concept of a fixed desktop that resides on a physical piece of  
hardware that you own feels so 20th century
to me. One way or the other the online identity issue is going to be  
settled. For contenders, though, I'd

rather look at: factotum or things like OAuth.


I agree, and I think this is one of the most attractive things to me  
about Plan 9.


I don't think there's a reasonable conversation to be had with folks  
struggling to provide solutions
for taking the pain out of managing plain text passwords. The pain  
is there for a reason.



I couldn't agree more. One of the first things that piqued my interest  
in Plan 9 was finding out that 9p's authentication system works a lot  
like Kerberos. I am very annoyed by security theater, which is one  
reason I don't object at all to the host-owner security model Plan 9  
uses.


—
Daniel Lyons




Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Anthony Sorace
this is silly. the philosophy has been explained. several people have
given lots of real world usage where it holds up just fine. i'd go
as far as to say the vast majority of plan9 installations are in such
environments.

but regardless, correcting what may be a whole in your environment is
easy; just do so and be done with it.



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Daniel Lyons


On Aug 6, 2009, at 6:59 PM, hiro wrote:


don't forget to take away the connectors from the power and reset
buttons, otherwise good security concepts;)


Just out of curiosity, is it possible to simply unbind the console on  
one of these servers after bootup in some startup script? Or perhaps  
unbind the keyboard device, so you can see messages but not type  
anything in? Maybe use cat /dev/kprint instead of rc? It seems like it  
ought to be possible to disable the physical console this way. I ask  
simply as a way of reducing worry about passerby, not as a security  
solution.


—
Daniel Lyons




Re: [9fans] linux reinvents factotum, secstore ...

2009-08-06 Thread erik quanstrom
 These are reasonable questions (and many of them have yes as the  
 answer ;-)) but I have a more
 fundamental objection here: the desktop is just NOT the place for such  
 a functionality to originate from. The very
 concept of a fixed desktop that resides on a physical piece of  
 hardware that you own feels so 20th century
 to me. One way or the other the online identity issue is going to be  
 settled. For contenders, though, I'd
 rather look at: factotum or things like OAuth.

X11 way back when, for all its faults, was more network
centric than openview or anything that came after.

- erik



Re: [9fans] binary sprint format

2009-08-06 Thread Adriano Verardo

j...@plan9.bell-labs.com wrote:

the kernel library include file (../port/lib.h)
does not have a pragma in it for %b. if this is
indeed a kernel driver you are writing then you
should add the pragma in the driver:

#pragma varargcktypeb   int

the reason the kernel does not just use libc.h
is to catch the inadvertent use of routines from
libc.a that just won't work if used in the kernel
(e.g. functions that do system calls). if %b becomes
commonly used in the kernel and is safe to use
(not all format specifiers are safe in the kernel,
e.g. those for floating point) then it will find
its way into ../port/lib.h.

--jim


  

It works perfectly.

Thank you very much, Jim.

adriano



Re: [9fans] Intel atom motherboard - success at last

2009-08-06 Thread erik quanstrom
On Thu Aug  6 19:36:22 EDT 2009, quans...@quanstro.net wrote:
  I went through all the default during the install and during fmtfossil
  I got a few
  
  matherror something and it crashed. I t wen too fast for me to take 
  notes.
 
 this is due to the awk problem reported this week.  i'll roll up
 another cd this evening.
 
 with ide turned off, you probablly just haven't gotten to the
 part where awk dies.

if you can get your machine on the network, you can
use /n/sources/contrib/quanstro/awk
bind /n/sources/contrib/quanstro/awk /bin/awk

i still have to figure out why i can't build a cd after binding
awk into a 9660srv fs.  well the cd gets built, it's just 20mb
too small.

- erik



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread lucio
 I honestly can't believe that this is even up for debate!  grin
 
 It's just bizarre.

It's not.  Nothing stops one  from putting the extra layer of security
in place, it's just a user-level change, just like it is in Unix to go
 from single-user to multi-user mode.  The fact that no-one has yet
found it necessary or worthwhile speaks volumes.  If you think it's
worth it, then you need to put your money where your mouth is.

As for me, I have way too much trouble understanding a hybrid of MIPS
and PC architecture to worry about securing equipment no one really
seems to want to break into.  You are forgetting that the cost of
security must be commensurate with the risk.  When Plan 9 is popular
enough for random visitors to desire to crack it, then the extra
security will be worth the extra effort.  Until then, we can all save
ourselves the bother, including trying to remember different passwords
for different hosts.

Am I remembering wrong that 2nd Edition had password control on CPU
servers?  I missed it briefly, then forgot about it.  Oh, yes, the
change arose from the new security infrastructure, Bell Labs did not
have the resources to port it so they abandoned it.  I adapted the old
password check for something else, but what with NVRAM's failings and
the effort involved, I never tried to get the CPU server to have a
secured console.

++L

PS: Off the cuff, I'd say that adding auth/as to init(8) on a CPU
server would be almost all that's needed, just like in Unix.  So this
discussion has been quite unnecessary.




Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread lucio
 I have direct experience as a contractor where I have entered
 many a co-lo; and was unimpressed with their security to say the least.
 I had constant and easy access to a large number of nameless servers,
 it's a nobrainer to access keyboard/monitor pairs in many of these places.

That would be vandalism.  You didn't indulge in it, why would you
expect someone else in your situation to do differently?  Or are you
lying to us?

++L




Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread lucio
 I honestly can't believe that this is even up for debate!  grin
 
 It's just bizarre.

It's not.  Nothing stops one  from putting the extra layer of security
in place, it's just a user-level change, just like it is in Unix to go
 from single-user to multi-user mode.  The fact that no-one has yet
found it necessary or worthwhile speaks volumes.  If you think it's
worth it, then you need to put your money where your mouth is.

As for me, I have way too much trouble understanding a hybrid of MIPS
and PC architecture to worry about securing equipment no one really
seems to want to break into.  You are forgetting that the cost of
security must be commensurate with the risk.  When Plan 9 is popular
enough for random visitors to desire to crack it, then the extra
security will be worth the extra effort.  Until then, we can all save
ourselves the bother, including trying to remember different passwords
for different hosts.

Am I remembering wrong that 2nd Edition had password control on CPU
servers?  I missed it briefly, then forgot about it.  Oh, yes, the
change arose from the new security infrastructure, Bell Labs did not
have the resources to port it so they abandoned it.  I adapted the old
password check for something else, but what with NVRAM's failings and
the effort involved, I never tried to get the CPU server to have a
secured console.

++L

PS: Off the cuff, I'd say that adding auth/as to init(8) on a CPU
server would be almost all that's needed, just like in Unix.  So this
discussion has been quite unnecessary.




Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Corey
On Thursday 06 August 2009 21:19:36 lu...@proxima.alt.za wrote:
  I have direct experience as a contractor where I have entered
  many a co-lo; and was unimpressed with their security to say the least.
  I had constant and easy access to a large number of nameless servers,
  it's a nobrainer to access keyboard/monitor pairs in many of these
  places.

 That would be vandalism.  You didn't indulge in it, why would you
 expect someone else in your situation to do differently?  Or are you
 lying to us?


You'll have to do alot better than that if you want to get under my skin.

Begone, troll.





Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Daniel Lyons


On Aug 6, 2009, at 10:19 PM, lu...@proxima.alt.za wrote:


I have direct experience as a contractor where I have entered
many a co-lo; and was unimpressed with their security to say the  
least.

I had constant and easy access to a large number of nameless servers,
it's a nobrainer to access keyboard/monitor pairs in many of these  
places.


That would be vandalism.  You didn't indulge in it, why would you
expect someone else in your situation to do differently?  Or are you
lying to us?



Story time. :)

Several years ago I worked for a company here that had decided to  
colocate a server locally (yeah, brilliant, in Albuquerque) instead of  
getting a hosted server somewhere with better access. I wound up going  
down there a few times to add RAM to the system. Apart from my  
company, there were a smattering of other smalltimers with big tower  
computers from Dell on this rack and off on the other side of the  
facility was a fenced off area with four or five racks of Dell  
hardware. The owner casually mentioned to me that the company who  
owned the racks had something to do with airline ticket sales. I guess  
because I chuckled at that, he also mentioned to me that the computer  
next to ours was hosting the governor's re-election website. I thought  
about doing something malicious, because I'm not a big fan of  
Richardson, but decided it wasn't worth the trouble.


Later on one of the owners of the colo facility got bought out and  
blew up. He went into the facility and ripped out the primary router,  
then took the upstream cable and plugged it into another port on the  
backup router such that the packets wound up going in a cycle. Then he  
damaged the backup power system and flew out the door with the primary  
router.


Not really taking a position here but your comments reminded me of the  
story. I guess there's always a bigger jerk out there and sometimes he  
runs your colo facility.


—
Daniel Lyons




[9fans] the old floppy set

2009-08-06 Thread John Floren
Looking at the very old mailing list archives, I noticed something
about a 3-disk (or was it 4-disk?) floppy-based distribution of the
earliest PC dist. Is that still available in some form? I just came
into possession of a stack of floppies and a pair of 486s and I'm
ready to dare to be stupid.


John
-- 
Object-oriented design is the roman numerals of computing -- Rob Pike



Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread Corey
On Thursday 06 August 2009 21:19:05 lu...@proxima.alt.za wrote:
snip
 If you think it's worth it, then you need to put your money where your 
 mouth is.


Like I said:

Anyhow... I guess there's no reason to argue/debate! Looks like I
have some options

... and later:

[...] plus, I've already been provided with solutions from which I can roll 
my  own.


 You are forgetting that the cost of security must be commensurate with 
 the risk. 


I'm forgetting what?

The Plan 9 way of thinking (wrt the security of physical terminal access)
completely undermines, or somehow fails to recognize, the very real fact 
that there is always a cost/risk effort/reward equation at play.


 When Plan 9 is popular enough for random visitors to desire to crack it,
 then the extra security will be worth the extra effort.  Until then, we can
 all save ourselves the bother


Sheesh:

I think the actual root of the situation, is simply that Plan 9 currently
tends to reside within domains with much more strict and secure
or trustworthy environments vs. being prevalent within the sphere of
the great unwashed masses of the industry where strong physical 
security is either unobtainable, unaffordable, and/or unreliable at best.


 Am I remembering wrong that 2nd Edition had password control on CPU
 servers?  I missed it briefly, then forgot about it.  Oh, yes, the
 change arose from the new security infrastructure, Bell Labs did not
 have the resources to port it so they abandoned it.  I adapted the old
 password check for something else, but what with NVRAM's failings and
 the effort involved, I never tried to get the CPU server to have a
 secured console.


I mention there are reasonable use-cases for a secured console on Plan 9
servers, and everybody attempts to show me why such a concept is completely
unnecessary but in fact it's simply a matter of Bell Labs and others not
having the resources to implement it in later editions.  And in fact it was
a feature that previously existed. 


 PS: Off the cuff, I'd say that adding auth/as to init(8) on a CPU
 server would be almost all that's needed, just like in Unix.  So this
 discussion has been quite unnecessary.


Cool, it's a total no-brainer to implement; the discussion can end now. 





Re: [9fans] a few Q's regarding cpu/auth server

2009-08-06 Thread John Floren
On Thu, Aug 6, 2009 at 8:04 PM, Daniel Lyonsfus...@storytotell.org wrote:

 On Aug 6, 2009, at 6:59 PM, hiro wrote:

 don't forget to take away the connectors from the power and reset
 buttons, otherwise good security concepts;)

 Just out of curiosity, is it possible to simply unbind the console on one of
 these servers after bootup in some startup script? Or perhaps unbind the
 keyboard device, so you can see messages but not type anything in? Maybe use
 cat /dev/kprint instead of rc? It seems like it ought to be possible to
 disable the physical console this way. I ask simply as a way of reducing
 worry about passerby, not as a security solution.


You should be able to hack /sys/src/cmd/init.c to make it start
whatever you want after booting, based on init(8), but I haven't tried
it. The man page says it prompts for a password on the cpu server, but
that doesn't happen; the source has a pass function but it's not
called anywhere.

I don't have a real terminal or cpu server at my apartment, so I can't
test it right now.


John
-- 
Object-oriented design is the roman numerals of computing -- Rob Pike