Re: [gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Michael Orlitzky
On 07/29/2018 09:16 PM, Ulrich Mueller wrote: > > Staying with the man:man example, how would anybody become the "man" > user, in the first place? That user has /bin/false as a shell and no > valid password. One way would be to exploit a process that's running as the "man" user. Ostensibly such

Re: [gentoo-dev] rfc: [QA] Ban policy introduction

2018-07-29 Thread Robin H. Johnson
On Sun, Jul 29, 2018 at 12:40:18AM +0300, Mikle Kolyada wrote: > (e.g make major changes to the widely used eclasses without prior > discussion on the mailing list or What's the metric to say if a given eclass is widely used? -- Robin Hugh Johnson Gentoo Linux: Dev, Infra Lead, Foundation

Re: [gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Ulrich Mueller
> On Sun, 29 Jul 2018, Michael Orlitzky wrote: > After thinking about this for a while, I think we should ignore setgid > but not setuid executables. The problem with setuid and a non-root owner > is that the owner can always exploit the situation: > Suppose /bin/foo is owned by "foo" and

[gentoo-portage-dev] [PATCH v2 0/2] Two insecure ownership and group-writability QA checks.

2018-07-29 Thread Michael Orlitzky
Changes in v2: * Also check executables in /opt/bin (mgorny). * Don't report group-writable executables that are setgid (ulm). * Add a comment on why we don't do the same for setuid. * Wrap long lines with backslashes. * Fix nesting of output loop; output should happen after all checks.

[gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Michael Orlitzky
System executables that are not owned by root pose a security risk. The owner of the executable is free to modify it at any time; so, for example, he can change a daemon's behavior to make it malicious before the next time the service is started (usually by root). On a "normal" system, there is

[gentoo-portage-dev] [PATCH 2/2] bin/install-qa-check.d: add new 90bad-bin-group-write QA check.

2018-07-29 Thread Michael Orlitzky
System executables that are writable by a non-root user pose a security risk. Anyone who can write to an executable can change its behavior. If that executable is later run with elevated privileges (say, by root, when the machine starts), then the non-root user can escalate his own privileges to

[gentoo-dev] Automated Package Removal and Addition Tracker, for the week ending 2018-07-29 23:59 UTC

2018-07-29 Thread Robin H. Johnson
-peripheral-steamcontroller 20180723-17:37 candrews 19a303ca833 sys-apps/sensei-raw-ctl 20180729-09:41 thev00d00 c17ecff78b0 sys-fs/fatresize 20180727-17:22 jer c095a8110e5 -- Robin Hugh Johnson Gentoo Linux Developer E-Mail

Re: [gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Michael Orlitzky
On 07/29/2018 03:43 PM, Ulrich Mueller wrote: > >> On a "normal" system, there is no good reason why the superuser should >> not own every system executable. This commit adds a new install-time >> check that reports any such binaries with a QA warning. To avoid false >> positives, non-"normal"

Re: [gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Michael Orlitzky
On 07/29/2018 03:43 PM, Ulrich Mueller wrote: > > Shouldn't this check for setuid binaries like /usr/bin/mandb (which is > owned by man:man)? I think these are legitimate usage case. > In general, yeah. I think we should be skeptical of setuid/gid executables, but this isn't the right place to

Re: [gentoo-dev] rfc: moving default location of portage tree (was: [gentoo-project] Call for agenda items - Council meeting 2018-07-29)

2018-07-29 Thread Matt Turner
On Sun, Jul 29, 2018 at 1:01 PM, Rich Freeman wrote: > On Sun, Jul 29, 2018 at 3:56 PM Matt Turner wrote: >> >> On Fri, Jul 27, 2018 at 1:32 AM, Ulrich Mueller wrote: >> > >> > So, considering all the feedback from mailing list and IRC: >> > >> >/usr/portage ->

Re: [gentoo-dev] rfc: moving default location of portage tree

2018-07-29 Thread Ulrich Mueller
> On Fri, 27 Jul 2018, Brian Dolbec wrote: > On Fri, 27 Jul 2018 16:31:15 +0200 > Ulrich Mueller wrote: >> > On Fri, 27 Jul 2018, Corentin “Nado” Pazdera wrote: >> >> > From the same source >> > "No other requirements are made on the data format of the cache >> > directories." >> > And

Re: [gentoo-dev] rfc: moving default location of portage tree (was: [gentoo-project] Call for agenda items - Council meeting 2018-07-29)

2018-07-29 Thread M. J. Everitt
On 29/07/18 21:01, Rich Freeman wrote: > > > Why not stick the repos in /var/repos and not /var/db/repos? If we're > just making up paths, why not make up a shorter one? I don't think > any other linux distros use /var/db... > *BSD I believe .. signature.asc Description: OpenPGP digital

Re: [gentoo-dev] rfc: moving default location of portage tree (was: [gentoo-project] Call for agenda items - Council meeting 2018-07-29)

2018-07-29 Thread Rich Freeman
On Sun, Jul 29, 2018 at 3:56 PM Matt Turner wrote: > > On Fri, Jul 27, 2018 at 1:32 AM, Ulrich Mueller wrote: > > > > So, considering all the feedback from mailing list and IRC: > > > >/usr/portage -> /var/db/repos/gentoo > >/usr/portage/distfiles ->

Re: [gentoo-dev] rfc: moving default location of portage tree (was: [gentoo-project] Call for agenda items - Council meeting 2018-07-29)

2018-07-29 Thread Matt Turner
On Fri, Jul 27, 2018 at 1:32 AM, Ulrich Mueller wrote: >> On Thu, 19 Jul 2018, Chí-Thanh Christopher Nguyễn wrote: > >>> Users must never need to modify files in /var/lib to configure a >>> package's operation, and _the_specific_file_hierarchy_ used to >>> store the data _must_not_be_

Re: [gentoo-dev] rfc: moving default location of portage tree (was: [gentoo-project] Call for agenda items - Council meeting 2018-07-29)

2018-07-29 Thread Matt Turner
On Fri, Jul 27, 2018 at 1:40 AM, Michał Górny wrote: > Dnia 27 lipca 2018 10:32:17 CEST, Ulrich Mueller napisał(a): >>> On Thu, 19 Jul 2018, Chí-Thanh Christopher Nguyễn wrote: >> Users must never need to modify files in /var/lib to configure a package's operation, and

Re: [gentoo-dev] rfc: moving default location of portage tree (was: [gentoo-project] Call for agenda items - Council meeting 2018-07-29)

2018-07-29 Thread Ulrich Mueller
[Proxying a message from Anders Thomson ] Hi Ulrich, As non-devs aren't allowed to post to gentoo-dev, I was hoping that you would proxy this question/comment for me. While on the subject of changing defaults, could we consider changing the (default) location of the pkg db? Roughly everything in

Re: [gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Ulrich Mueller
> On Sun, 29 Jul 2018, Michael Orlitzky wrote: > System executables that are not owned by root pose a security > risk. The owner of the executable is free to modify it at any time; > so, for example, he can change a daemon's behavior to make it > malicious before the next time the service is

Re: [gentoo-dev] rfc: moving default location of portage tree (was: [gentoo-project] Call for agenda items - Council meeting 2018-07-29)

2018-07-29 Thread Michał Górny
W dniu pią, 27.07.2018 o godzinie 08∶06 -0700, użytkownik Brian Dolbec napisał: > On Fri, 27 Jul 2018 16:31:15 +0200 > Ulrich Mueller wrote: > > > > > > > > On Fri, 27 Jul 2018, Corentin “Nado” Pazdera wrote: > > > July 27, 2018 4:07 PM, "William Hubbs" > > > wrote: > > > > Section 5.5.2

Re: [gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Michał Górny
W dniu nie, 29.07.2018 o godzinie 13∶37 -0400, użytkownik Michael Orlitzky napisał: > System executables that are not owned by root pose a security > risk. The owner of the executable is free to modify it at any time; > so, for example, he can change a daemon's behavior to make it > malicious

[gentoo-portage-dev] [PATCH 2/2] bin/install-qa-check.d: add new 90bad-bin-group-write QA check.

2018-07-29 Thread Michael Orlitzky
System executables that are writable by a non-root user pose a security risk. Anyone who can write to an executable can change its behavior. If that executable is later run with elevated privileges (say, by root, when the machine starts), then the non-root user can escalate his own privileges to

[gentoo-portage-dev] [PATCH 0/2] Two insecure ownership and group-writability QA checks.

2018-07-29 Thread Michael Orlitzky
Discussed and implemented in, https://bugs.gentoo.org/629398 Michael Orlitzky (2): bin/install-qa-check.d: add new 90bad-bin-owner QA check. bin/install-qa-check.d: add new 90bad-bin-group-write QA check. bin/install-qa-check.d/90bad-bin-group-write | 40

[gentoo-portage-dev] [PATCH 1/2] bin/install-qa-check.d: add new 90bad-bin-owner QA check.

2018-07-29 Thread Michael Orlitzky
System executables that are not owned by root pose a security risk. The owner of the executable is free to modify it at any time; so, for example, he can change a daemon's behavior to make it malicious before the next time the service is started (usually by root). On a "normal" system, there is

[gentoo-dev] Re: rfc: [QA] Ban policy introduction

2018-07-29 Thread Mikle Kolyada
On 29.07.2018 00:40, Mikle Kolyada wrote: > Hello, > > The Gentoo QA team would like to introduce the following policy that > would be applied to individuals breaking the state and quality of the > main gentoo.git tree > > ( as we do not have this strictly documented yet): > > > > If

Re: [gentoo-dev] rfc: [QA] Ban policy introduction

2018-07-29 Thread Gordon Pettey
On Sun, Jul 29, 2018 at 4:17 AM, Andrew Savchenko wrote: > On Sun, 29 Jul 2018 16:47:47 +0900 Alice Ferrazzi wrote: >> Sent from my phone. Please excuse my brevity. >> >> On Sun, 29 Jul 2018, 16:39 Fabian Groffen, wrote: >> >> > Completely agreeing with Sergei, with some additional suggestions:

Re: [gentoo-dev] rfc: [QA] Ban policy introduction

2018-07-29 Thread Andrew Savchenko
On Sun, 29 Jul 2018 16:47:47 +0900 Alice Ferrazzi wrote: > Sent from my phone. Please excuse my brevity. > > On Sun, 29 Jul 2018, 16:39 Fabian Groffen, wrote: > > > Completely agreeing with Sergei, with some additional suggestions: > > > > On 28-07-2018 23:14:12 +0100, Sergei Trofimovich wrote:

Re: [gentoo-dev] rfc: [QA] Ban policy introduction

2018-07-29 Thread Alice Ferrazzi
Sent from my phone. Please excuse my brevity. On Sun, 29 Jul 2018, 16:39 Fabian Groffen, wrote: > Completely agreeing with Sergei, with some additional suggestions: > > On 28-07-2018 23:14:12 +0100, Sergei Trofimovich wrote: > > On Sun, 29 Jul 2018 00:40:18 +0300 > > Mikle Kolyada wrote: > > >

Re: [gentoo-dev] rfc: [QA] Ban policy introduction

2018-07-29 Thread Fabian Groffen
Completely agreeing with Sergei, with some additional suggestions: On 28-07-2018 23:14:12 +0100, Sergei Trofimovich wrote: > On Sun, 29 Jul 2018 00:40:18 +0300 > Mikle Kolyada wrote: > > > Hello, > > > > The Gentoo QA team would like to introduce the following policy that > > would be applied