Re: [77859] trunk/dports/python

2011-04-18 Thread Mark Evenson
On Apr 18, 2011, at 08:36 , Ryan Schmidt wrote: […] > Ports that are not python modules but merely use python probably should only > exist as a single port (whose name does not begin with a py*- prefix, and > which is not in the python category) and instead have variants for each > supported

Re: [77967] trunk/dports/devel/gource/Portfile

2011-04-18 Thread Ryan Schmidt
On Apr 18, 2011, at 03:41, p...@macports.org wrote: > Revision: 77967 > http://trac.macports.org/changeset/77967 > Author: p...@macports.org > Date: 2011-04-18 01:41:52 -0700 (Mon, 18 Apr 2011) > Log Message: > --- > updaded gource to 0.32 > > Modified Paths: > ---

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
So, let's take it that security is the cumulative property of the tools, the process, and the hosting arrangement. For starters, I think a fundamental question is what kind of signatures to use and how things are signed. ASF, for example, does a pretty job of laying this out in one page: http:

Re: DNS lookups inside a chroot

2011-04-18 Thread Rainer Müller
On 04/17/2011 11:25 PM, Jordan K. Hubbard wrote: > Perhaps a better idea would be to enhance trace mode such that it > "faults in" stuff on demand into a run-specific staging area. > Read-only opens of the files in the system would succeed, of course, > it being only creations or rw/append opens wh

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 1:29 AM, Thomas de Grivel wrote: > Le 04/16/11 20:56, Jordan K. Hubbard a écrit : >> >> On Apr 16, 2011, at 7:59 AM, Thomas de Grivel wrote: >> >>> I can't believe you actually mean that. I think you do not understand the >>> problems fixed by this security proposition. And

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
On 18 Apr 2011, at 06:29, Thomas de Grivel wrote: > Le 04/16/11 20:56, Jordan K. Hubbard a écrit : >> >> Heh. That is an interestingly self-canceling argument. "If you are not >> willing to go out of your way to facilitate my own unwise usage of the >> machine in a completely unsecured enviro

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 08:27, Jeff Johnson wrote: > > You are assuming a threat vector reasoning that starts: >        0) assume sudo is "infected" maliciosly. >        ... >        42) anything is possible, including other ppkgs infected and > distributed. > > The answer there is not using an p

Re: security projects thoughts

2011-04-18 Thread Daniel J. Luke
On Apr 18, 2011, at 9:27 AM, Arno Hautala wrote: > > So let's say you're for some reason using the MacPorts sudo instead of > the system shipped version (maybe the system version is out of date > and insecure). You're updating your ports at a cafe and someone spoofs > the update for the sudo port.

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 06:12, Bayard Bell wrote: > > I've read back on the threads from March about binary packaging and > appreciate better what constraints were accepted to simplify deployment. The > signed Macports releases in distfiles that Anders pointed me to is signed > with GPG. Given tha

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 09:38, Daniel J. Luke wrote: > On Apr 18, 2011, at 9:27 AM, Arno Hautala wrote: >> >> So let's say you're for some reason using the MacPorts sudo instead of >> the system shipped version (maybe the system version is out of date >> and insecure). You're updating your ports a

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 9:27 AM, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 08:27, Jeff Johnson wrote: >> >> You are assuming a threat vector reasoning that starts: >>0) assume sudo is "infected" maliciosly. >>... >>42) anything is possible, including other ppkgs infected

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
On 18 Apr 2011, at 14:48, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 09:38, Daniel J. Luke wrote: >> On Apr 18, 2011, at 9:27 AM, Arno Hautala wrote: >>> >>> So let's say you're for some reason using the MacPorts sudo instead of >>> the system shipped version (maybe the system version is out

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 09:55, Jeff Johnson wrote: > >> So let's say you're for some reason using the MacPorts sudo instead of >> the system shipped version (maybe the system version is out of date >> and insecure). You're updating your ports at a cafe and someone spoofs >> the update for the sudo

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 9:40 AM, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 06:12, Bayard Bell > wrote: >> >> I've read back on the threads from March about binary packaging and >> appreciate better what constraints were accepted to simplify deployment. The >> signed Macports releases in distfil

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 10:03 AM, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 09:55, Jeff Johnson wrote: >> >>> So let's say you're for some reason using the MacPorts sudo instead of >>> the system shipped version (maybe the system version is out of date >>> and insecure). You're updating your po

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 10:02, Bayard Bell wrote: > > I think we need to temper how the examples are flying: an evil network > operator can do egregious damage, but macports isn't exactly the thing end of > the wedge for exploiting the implied level of trust. True. Outlandish examples can be sa

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
On 18 Apr 2011, at 15:04, Jeff Johnson wrote: > What is the basis for "attractive" or not? I should be clear about this: if we want greater security these are things that need to be decided, and this isn't a question of some set of completely self-evident technical merits for which patches can

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 10:04, Jeff Johnson wrote: > > On Apr 18, 2011, at 9:40 AM, Arno Hautala wrote: > >> I'm all for more GPG adoption, but it might be a good idea to be >> consistent and stick with OpenSSL. > > These are opinions only, without any supplied reason to prefer OpenPGP > over Open

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
On 18 Apr 2011, at 15:11, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 10:02, Bayard Bell > wrote: >> >> I think we need to temper how the examples are flying: an evil network >> operator can do egregious damage, but macports isn't exactly the thing end >> of the wedge for exploiting the impl

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 10:11 AM, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 10:02, Bayard Bell > wrote: >> >> I think we need to temper how the examples are flying: an evil network >> operator can do egregious damage, but macports isn't exactly the thing end >> of the wedge for exploiting the

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 10:35 AM, Jeff Johnson wrote: > > On Apr 18, 2011, at 10:11 AM, Arno Hautala wrote: > >> On Mon, Apr 18, 2011 at 10:02, Bayard Bell >> wrote: >>> >>> I think we need to temper how the examples are flying: an evil network >>> operator can do egregious damage, but macports

Re: DNS lookups inside a chroot

2011-04-18 Thread Joshua Root
I *think* this does that (corrections welcome...): socat UNIX-LISTEN:mpchroot/private/var/run/mDNSResponder,mode=666,fork UNIX-CONNECT:/private/var/run/mDNSResponder But with that running, attempting to ping in the chroot just keeps repeating these errors in system.log: mDNSResponder[26]: 42: re

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
On 18 Apr 2011, at 15:55, Jeff Johnson wrote: > Note no "key management" or "delegated trust" through signing by > developers or other "central authority" other than what the build system > chooses to use, thereby simplifying the needed deployment. > > And its the "build system" not the upstream

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 10:35, Jeff Johnson wrote: > > The actual implementation goes something like this: >        a keypair is generated >        just built packages are >                a) include the pubkey >                b) signed with the private key >        and the private key is discard

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 11:14 AM, Bayard Bell wrote: > On 18 Apr 2011, at 15:55, Jeff Johnson wrote: > >> Note no "key management" or "delegated trust" through signing by >> developers or other "central authority" other than what the build system >> chooses to use, thereby simplifying the needed dep

Re: DNS lookups inside a chroot

2011-04-18 Thread William Siegrist
On Apr 18, 2011, at 3:42 AM, Rainer Müller wrote: > On 04/17/2011 11:25 PM, Jordan K. Hubbard wrote: >> Perhaps a better idea would be to enhance trace mode such that it >> "faults in" stuff on demand into a run-specific staging area. >> Read-only opens of the files in the system would succeed, of

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 11:25 AM, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 10:35, Jeff Johnson wrote: >> >> The actual implementation goes something like this: >>a keypair is generated >>just built packages are >>a) include the pubkey >>b) signed

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 11:34, Jeff Johnson wrote: > > You asked what other systems are in use. I replied. If you > don't like what is implemented, all I can say is >        Patches cheerfully accepted. I asked what systems are in use in order to investigate options for MacPorts. I'm pointing out

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
On 18 Apr 2011, at 16:26, Jeff Johnson wrote: >> There's already been some references to having some kind of automated build >> service/sausage factory. Could you provide more info about how this is done >> with rpm at Red Hat? > > Disclaimer: > I haven't been associated with Red Hat sinc

Re: [77883] trunk/dports/graphics/dcmtk

2011-04-18 Thread Eric A. Borisch
On Sat, Apr 16, 2011 at 7:19 PM, Ryan Schmidt wrote: > Sending reply back to list... > > On Apr 16, 2011, at 07:57, Eric A. Borisch wrote: > >> On Sat, Apr 16, 2011 at 6:17 AM, Ryan Schmidt wrote: +variant llvm description "Use llvm compiler" { +  configure.compiler    llvm-gcc-4.2

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 12:04 PM, Arno Hautala wrote: > On Mon, Apr 18, 2011 at 11:34, Jeff Johnson wrote: >> >> You asked what other systems are in use. I replied. If you >> don't like what is implemented, all I can say is >>Patches cheerfully accepted. > > I asked what systems are in use

Re: security projects thoughts

2011-04-18 Thread Daniel J. Luke
On Apr 18, 2011, at 12:36 PM, Jeff Johnson wrote: > > And a generated keypair with the private key discarded and > the public key registered with time stamp differs ... how? Where is the public key registered? Does the end-user installer do something like: 1. Check that the public key in the pa

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 12:23 PM, Bayard Bell wrote: > On 18 Apr 2011, at 16:26, Jeff Johnson wrote: > >>> There's already been some references to having some kind of automated build >>> service/sausage factory. Could you provide more info about how this is done >>> with rpm at Red Hat? >> >> Dis

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 12:45 PM, Daniel J. Luke wrote: > On Apr 18, 2011, at 12:36 PM, Jeff Johnson wrote: >> >> And a generated keypair with the private key discarded and >> the public key registered with time stamp differs ... how? > > Where is the public key registered? Does the end-user instal

Re: security projects thoughts

2011-04-18 Thread Bayard Bell
On 18 Apr 2011, at 17:45, Jeff Johnson wrote: >> Sorry, there's a gap in explicitness here. What's done to prevent the >> robo-signer and/or build system from accepting arbitrary content? This isn't >> relying on a trusted network, presumably there's some idea of who's allowed >> to request a b

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 1:02 PM, Bayard Bell wrote: > On 18 Apr 2011, at 17:45, Jeff Johnson wrote: > >>> Sorry, there's a gap in explicitness here. What's done to prevent the >>> robo-signer and/or build system from accepting arbitrary content? This >>> isn't relying on a trusted network, presuma

Re: security projects thoughts

2011-04-18 Thread Arno Hautala
On Mon, Apr 18, 2011 at 12:36, Jeff Johnson wrote: > > On Apr 18, 2011, at 12:04 PM, Arno Hautala wrote: > >> On Mon, Apr 18, 2011 at 11:34, Jeff Johnson wrote: >>> >>> You asked what other systems are in use. I replied. If you >>> don't like what is implemented, all I can say is >>>        Patch

Re: security projects thoughts

2011-04-18 Thread Daniel J. Luke
On Apr 18, 2011, at 1:00 PM, Jeff Johnson wrote: > >> Where is the public key registered? Does the end-user installer do something >> like: > > In the scheme I outline, the package itself "registers" the pubkey. I was actually interested in how/where the package registers the pubkey (and also

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 1:15 PM, Arno Hautala wrote: > >> There are no XSS threats in most cases for "package management" >> because the delivery is usually from static content on mirrors, >> not from some dynamic store. Even if "packages" are delivered from >> a "web server" the attack is against t

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 1:39 PM, Daniel J. Luke wrote: > On Apr 18, 2011, at 1:00 PM, Jeff Johnson wrote: >> >>> Where is the public key registered? Does the end-user installer do >>> something like: >> >> In the scheme I outline, the package itself "registers" the pubkey. > > I was actually inte

Re: security projects thoughts

2011-04-18 Thread Daniel J. Luke
On Apr 18, 2011, at 1:50 PM, Jeff Johnson wrote: > >> so if someone wants to maliciously inject a package, he/she would have to >> impersonate the private SKS keyserver in order to be successful, right? I >> haven't run a keyserver, and am not really familiar with the protocol >> implementation

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 1:54 PM, Daniel J. Luke wrote: > On Apr 18, 2011, at 1:50 PM, Jeff Johnson wrote: >> >>> so if someone wants to maliciously inject a package, he/she would have to >>> impersonate the private SKS keyserver in order to be successful, right? I >>> haven't run a keyserver, and

Re: security projects thoughts

2011-04-18 Thread Daniel J. Luke
On Apr 18, 2011, at 2:01 PM, Jeff Johnson wrote: > > Differentiating a 3rd party package that originated outside of > The One True Build System needs either a trusted time stamp how does a trusted time stamp tell you that the origin wasn't from the one true build system? > (which has persistent

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 2:16 PM, Daniel J. Luke wrote: > On Apr 18, 2011, at 2:01 PM, Jeff Johnson wrote: >> >> Differentiating a 3rd party package that originated outside of >> The One True Build System needs either a trusted time stamp > > how does a trusted time stamp tell you that the origin wa

Re: security projects thoughts

2011-04-18 Thread Daniel J. Luke
On Apr 18, 2011, at 2:29 PM, Jeff Johnson wrote: > > On Apr 18, 2011, at 2:16 PM, Daniel J. Luke wrote: >> On Apr 18, 2011, at 2:01 PM, Jeff Johnson wrote: >>> >>> Differentiating a 3rd party package that originated outside of >>> The One True Build System needs either a trusted time stamp >> >>

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 2:40 PM, Daniel J. Luke wrote: > > I'm asking about creepy uncle joe's skanky package build system that the > local coffee shop network has been set up to make look like it's the product > of the official build system. > Creepy uncle joe's skanky build system is detectabl

Re: [77907] trunk/dports/editors

2011-04-18 Thread Dan Ports
On Sun, Apr 17, 2011 at 04:01:37AM -0500, Ryan Schmidt wrote: > On Apr 17, 2011, at 02:48, sai...@macports.org wrote: > > > Revision: 77907 > > http://trac.macports.org/changeset/77907 > > Author: sai...@macports.org > > Date: 2011-04-17 00:48:17 -0700 (Sun, 17 Apr 2011) > > Log Mes

Re: security projects thoughts

2011-04-18 Thread Daniel J. Luke
On Apr 18, 2011, at 3:11 PM, Jeff Johnson wrote: > > On Apr 18, 2011, at 2:40 PM, Daniel J. Luke wrote: >> I'm asking about creepy uncle joe's skanky package build system that the >> local coffee shop network has been set up to make look like it's the product >> of the official build system. >

Re: DNS lookups inside a chroot

2011-04-18 Thread Jordan K. Hubbard
On Apr 18, 2011, at 3:42 AM, Rainer Müller wrote: > Trace mode relies on DYLD_INSERT_LIBRARIES being passed to children in > the environment. Then the loader overrides the syscall wrappers from > libSystem with our own implementation. > > From a security perspective it would be quite easy to bre

Re: security projects thoughts

2011-04-18 Thread Jeff Johnson
On Apr 18, 2011, at 6:42 PM, Daniel J. Luke wrote: > On Apr 18, 2011, at 3:11 PM, Jeff Johnson wrote: >> >> On Apr 18, 2011, at 2:40 PM, Daniel J. Luke wrote: >>> I'm asking about creepy uncle joe's skanky package build system that the >>> local coffee shop network has been set up to make look

Re: [77990] trunk/dports/graphics/openjpeg

2011-04-18 Thread Ryan Schmidt
On Apr 18, 2011, at 22:07, mcalh...@macports.org wrote: > Revision: 77990 > http://trac.macports.org/changeset/77990 > Author: mcalh...@macports.org > Date: 2011-04-18 20:07:31 -0700 (Mon, 18 Apr 2011) > Log Message: > --- > openjpeg: Fix inability to copy .dSYM directory w

Re: [77990] trunk/dports/graphics/openjpeg

2011-04-18 Thread Ryan Schmidt
On Apr 18, 2011, at 22:09, Ryan Schmidt wrote: > On Apr 18, 2011, at 22:07, mcalh...@macports.org wrote: > >> Revision: 77990 >> http://trac.macports.org/changeset/77990 >> Author: mcalh...@macports.org >> Date: 2011-04-18 20:07:31 -0700 (Mon, 18 Apr 2011) >> Log Message: >> --

dejagnu broken (at least according to gcc45)

2011-04-18 Thread Jack Howarth
Does the MacPorts dejagnu package work for anyone? Using a fresh installation of MacPorts on Snow Leopard, if I execute... sudo port -d -k install gcc45 sudo port install expect sudo port install dejagnu and 'cd' into the build directory from the gcc45 package build, I find that... sudo csh