Re: [Xastir] Trap for Young and Old

2014-06-23 Thread Liz
On Wed, 18 Jun 2014 21:31:29 -0700 (PDT)
Curt, WE7U curt.w...@gmail.com wrote:

 On Wed, 18 Jun 2014, Jason KG4WSV wrote:
 
  On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com
  wrote:
  Xastir does this, but would you want to trust security of your
  system to a bunch of hobbyists?  ;-)
 
  'cause that's not something linux users are familiar with. :|
 
 I think we might have more of a lack of security-trained Linux people
 on our development team...
 
 
  Technically it isn't a problem:  The AX.25 networking port is
  implemented similarly to ethernet ports in terms of permissions.
 
  For Xastir to be able to access the port, it needs root privileges.
 
  So you can't just chmod 666 /dev/ax25 (or whatever) so that xastir
  can access it running as joe user?
 
 I would think that would work as well, so one would need to tweak the
 udev scripts perhaps.  I'm no expert on that, having only hacked on
 them a few times myself for other reasons.  This would be a bit more
 difficult for a newbie to figure out and hack on any given system.
 There may be details that change from OS to OS and from version to
 version.  Worth a shot though as an alternate method.
 

Got caught with the same problem this Sunday.
For Debian packaging it would be possible to insert a question into the
post-install script to ask if you want xastir set with permissions 4755
- or whatever other solution is determined as best for the problem.

I'm not sure how the calife or chiark-really alternates to sudo would
be better than the current system.

Liz
VK2XSE
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-23 Thread David A Aitcheson

On 06/23/2014 06:36 AM, Liz wrote:
 On Wed, 18 Jun 2014 21:31:29 -0700 (PDT)
 Curt, WE7U curt.w...@gmail.com wrote:

 On Wed, 18 Jun 2014, Jason KG4WSV wrote:

 On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com
 wrote:
 Xastir does this, but would you want to trust security of your
 system to a bunch of hobbyists?  ;-)
 'cause that's not something linux users are familiar with. :|
 I think we might have more of a lack of security-trained Linux people
 on our development team...


 Technically it isn't a problem:  The AX.25 networking port is
 implemented similarly to ethernet ports in terms of permissions.

 For Xastir to be able to access the port, it needs root privileges.
 So you can't just chmod 666 /dev/ax25 (or whatever) so that xastir
 can access it running as joe user?
 I would think that would work as well, so one would need to tweak the
 udev scripts perhaps.  I'm no expert on that, having only hacked on
 them a few times myself for other reasons.  This would be a bit more
 difficult for a newbie to figure out and hack on any given system.
 There may be details that change from OS to OS and from version to
 version.  Worth a shot though as an alternate method.

 Got caught with the same problem this Sunday.
 For Debian packaging it would be possible to insert a question into the
 post-install script to ask if you want xastir set with permissions 4755
 - or whatever other solution is determined as best for the problem.

 I'm not sure how the calife or chiark-really alternates to sudo would
 be better than the current system.

 Liz
 VK2XSE
 ___
 Xastir mailing list
 Xastir@lists.xastir.org
 http://xastir.org/mailman/listinfo/xastir

It depends how one sets the options in the config files; you can set
certain programs to automatically be sudo'd without additional
entering of a password. Me I just let them run and make me a semi-root
user, that way I don't have to risk typing in a password when
nefarious eyes are about.

Dave
KB3EFS

-- 
David A Aitcheson david.aitche...@gmail.com Go Green! Print this email
only when necessary.
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-23 Thread Liz
On Mon, 23 Jun 2014 10:53:26 -0400
David A Aitcheson david.aitche...@gmail.com wrote:

 It depends how one sets the options in the config files; you can set
 certain programs to automatically be sudo'd without additional
 entering of a password. Me I just let them run and make me a semi-root
 user, that way I don't have to risk typing in a password when
 nefarious eyes are about.

I have set my sudo that way, but we still haven't got a decision on an
appropriate way to handle the need for xastir to have access to the
ax25 port, without security risks.
I don't know how to do it with a udev rule, as I've only hacked rules
for hardware, and the hardware involved is different for each user.

Liz
VK2XSE
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-23 Thread Curt, WE7U

On Tue, 24 Jun 2014, Liz wrote:


On Mon, 23 Jun 2014 10:53:26 -0400
David A Aitcheson david.aitche...@gmail.com wrote:


It depends how one sets the options in the config files; you can set
certain programs to automatically be sudo'd without additional
entering of a password. Me I just let them run and make me a semi-root
user, that way I don't have to risk typing in a password when
nefarious eyes are about.


I have set my sudo that way, but we still haven't got a decision on an
appropriate way to handle the need for xastir to have access to the
ax25 port, without security risks.


If this page isn't adequate, let's add to it and then point other Wiki pages to 
it:

http://www.xastir.org/index.php/HowTo:AX.25



I don't know how to do it with a udev rule, as I've only hacked rules
for hardware, and the hardware involved is different for each user.


Same here.

--
Curt, WE7U.http://wetnet.net/~we7u
APRS Client Capabilities:  http://wetnet.net/~we7u/aprs_capabilities.html
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-23 Thread Lee Bengston
On Mon, Jun 23, 2014 at 6:36 AM, Liz ed...@billiau.net wrote:

 On Wed, 18 Jun 2014 21:31:29 -0700 (PDT)
 Curt, WE7U curt.w...@gmail.com wrote:

  On Wed, 18 Jun 2014, Jason KG4WSV wrote:
 
   On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com
   wrote:
   Xastir does this, but would you want to trust security of your
   system to a bunch of hobbyists?  ;-)
  
   'cause that's not something linux users are familiar with. :|
 
  I think we might have more of a lack of security-trained Linux people
  on our development team...
 
 
   Technically it isn't a problem:  The AX.25 networking port is
   implemented similarly to ethernet ports in terms of permissions.
  
   For Xastir to be able to access the port, it needs root privileges.
  
   So you can't just chmod 666 /dev/ax25 (or whatever) so that xastir
   can access it running as joe user?
 
  I would think that would work as well, so one would need to tweak the
  udev scripts perhaps.  I'm no expert on that, having only hacked on
  them a few times myself for other reasons.  This would be a bit more
  difficult for a newbie to figure out and hack on any given system.
  There may be details that change from OS to OS and from version to
  version.  Worth a shot though as an alternate method.
 

 Got caught with the same problem this Sunday.
 For Debian packaging it would be possible to insert a question into the
 post-install script to ask if you want xastir set with permissions 4755
 - or whatever other solution is determined as best for the problem.

 I'm not sure how the calife or chiark-really alternates to sudo would
 be better than the current system.


In my mind the update-xastir script ​is provided as a courtesy - a little
optional tool to make things easier.  If you manually update Xastir by
downloading a new set of files from CVS and re-compiling, you will do the
same thing - overwrite the xastir executable with a new one that has the
default permissions.  I don't really view this as a problem - I do realize
it can be difficult to remember that you changed the permissions of the
xastir executable when you first installed it.  The only way I could see
the script being modified is to have it look into the configuration file(s)
in the ~/.xastir directory and determine if a least one AX25 interface is
configured.  If yes, then prompt the user asking if he/she would like to
apply the 4755 permissions change.  That's a level of sophistication I
doubt was ever intended for that script, however.

Lee - K5DAT
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-18 Thread Jason KG4WSV

 On Jun 17, 2014, at 7:41 PM, David A Aitcheson david.aitche...@gmail.com 
 wrote:
 
 chmod 4755 /usr/local/bin/xastir

This is not a good idea - from a security standpoint it's very bad, and unless 
xastir is designed to drop/escalate the euid as needed you will end up with 
files in the users directory that are owned by root, leading to other problems.

The problem isn't xastir, it's ax25 networking. Maybe someone can offer a fix 
(e.g. udev rule) to solve the actual problem?

-Jason
kg4wsv

___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-18 Thread David A Aitcheson

On 06/18/2014 07:41 AM, Jason KG4WSV wrote:
 On Jun 17, 2014, at 7:41 PM, David A Aitcheson david.aitche...@gmail.com 
 wrote:

 chmod 4755 /usr/local/bin/xastir
 This is not a good idea - from a security standpoint it's very bad, and 
 unless xastir is designed to drop/escalate the euid as needed you will end up 
 with files in the users directory that are owned by root, leading to other 
 problems.

 The problem isn't xastir, it's ax25 networking. Maybe someone can offer a fix 
 (e.g. udev rule) to solve the actual problem?

 -Jason
 kg4wsv

 ___
 Xastir mailing list
 Xastir@lists.xastir.org
 http://xastir.org/mailman/listinfo/xastir

Try adding calife and or chiark-really to your system, they fixed a
bunch of irritations for me.

Dave KB3EFS

-- 
David A Aitcheson david.aitche...@gmail.com Go Green! Print this email
only when necessary.
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-18 Thread Curt, WE7U

On Wed, 18 Jun 2014, Jason KG4WSV wrote:


chmod 4755 /usr/local/bin/xastir


This is not a good idea - from a security standpoint it's very bad, and unless 
xastir is designed to drop/escalate the euid as needed you will end up with 
files in the users directory that are owned by root, leading to other problems.


Xastir does this, but would you want to trust security of your system to a 
bunch of hobbyists?  ;-)

We do what we can, but I wouldn't say Xastir has been thoroughly gone through 
from a security standpoint.  It's better than a lot of programs, as we took 
care when writing/modifying that portion of code, but there are no guarantees.



The problem isn't xastir, it's ax25 networking. Maybe someone can offer a fix 
(e.g. udev rule) to solve the actual problem?


Technically it isn't a problem:  The AX.25 networking port is implemented 
similarly to ethernet ports in terms of permissions.

For Xastir to be able to access the port, it needs root privileges.  Since it is a bad 
idea to run Xastir as root, you run it as a normal user but do the chmod 4755 
thing against the executable.  Hopefully those people who run that command have some idea 
of the implications to security.  Because of this it was decided NOT to put it into the 
script.  Those that need it can run the command separately, and hopefully read up on what 
it means prior.

--
Curt, WE7U.http://wetnet.net/~we7u
APRS Client Capabilities:  http://wetnet.net/~we7u/aprs_capabilities.html
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-18 Thread Jason KG4WSV
On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com wrote:
 Xastir does this, but would you want to trust security of your system to a
 bunch of hobbyists?  ;-)

'cause that's not something linux users are familiar with. :|

 We do what we can, but I wouldn't say Xastir has been thoroughly gone
 through from a security standpoint.  It's better than a lot of programs, as
 we took care when writing/modifying that portion of code, but there are no
 guarantees.

Yeah, and there's another lever of problems/challenges running SUID
root (or SUID anything for that matter), and it really shouldn't be
the xastir team's problem to give it that sort of scrutiny - it's
complicated enough without dealing with changing EUIDs as you go
along.

 Technically it isn't a problem:  The AX.25 networking port is implemented
 similarly to ethernet ports in terms of permissions.

 For Xastir to be able to access the port, it needs root privileges.

So you can't just chmod 666 /dev/ax25 (or whatever) so that xastir can
access it running as joe user?


-Jason
kg4wsv
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-17 Thread David A Aitcheson
Curt/Tom,

This occurrence leads me to wonder if we should consider adding chmod
4755 /usr/local/bin/xastir as the last line (or near to the last line)
to the script ./update-xastir for the next release?

73
Dave
KB3EFS


On 06/17/2014 05:58 PM, David wrote:
 Hi All..A couple of days ago i used ./update-xastir on my Linux
 Mint 17
 box update was ok but i found i couldnt access my AX25 tncport
 socket: Operation not permitted message came up in terminal that i 
 started
 it in..went round and round trying to find the answer..not too
 much white hair to pull out

 I had a thought about the chmod of xastir that was in the HowTo:AX25
 from the Xastir web site...
 went and did the chmod 4755 /usr/local/bin/xastir
 and bingo i was back in business

 obviously when i did the update it replaced the xastir bin file so
 needed the chmod again..

 them's the breaks .ive added this one in my notebook so i wont get
 caught again

 73 David VK4BDJ
 ___
 Xastir mailing list
 Xastir@lists.xastir.org
 http://xastir.org/mailman/listinfo/xastir


-- 
David A Aitcheson david.aitche...@gmail.com Go Green! Print this email
only when necessary.
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-17 Thread David A Aitcheson
Actually that line is in the file just commented out and replaced with
chmod 755 /usr/local/bin/xastir

Thus for Dave VK4BDJ's benefit a simple edit of the update-xastir script
would fix the problem as long as update-xastir does not get changed with
each update.

Which would be the equal of a dog chasing its own tail endlessly.

73 Dave KB3EFS

On 06/17/2014 08:41 PM, David A Aitcheson wrote:
 Curt/Tom,

 This occurrence leads me to wonder if we should consider adding chmod
 4755 /usr/local/bin/xastir as the last line (or near to the last line)
 to the script ./update-xastir for the next release?

 73
 Dave
 KB3EFS


 On 06/17/2014 05:58 PM, David wrote:
 Hi All..A couple of days ago i used ./update-xastir on my Linux
 Mint 17
 box update was ok but i found i couldnt access my AX25 tncport
 socket: Operation not permitted message came up in terminal that i 
 started
 it in..went round and round trying to find the answer..not too
 much white hair to pull out

 I had a thought about the chmod of xastir that was in the HowTo:AX25
 from the Xastir web site...
 went and did the chmod 4755 /usr/local/bin/xastir
 and bingo i was back in business

 obviously when i did the update it replaced the xastir bin file so
 needed the chmod again..

 them's the breaks .ive added this one in my notebook so i wont get
 caught again

 73 David VK4BDJ
 ___
 Xastir mailing list
 Xastir@lists.xastir.org
 http://xastir.org/mailman/listinfo/xastir


-- 
David A Aitcheson david.aitche...@gmail.com Go Green! Print this email
only when necessary.
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir


Re: [Xastir] Trap for Young and Old

2014-06-17 Thread David

Hi David..i t is a problem that ears its head if you use a AX25 Tnc port
but it could impact other things at times

i will do some testing of the update-xastir script with the line added
an see if it works with each update

thanks for the info David

73 David VK4BDJ





On 18/06/14 12:45, David A Aitcheson wrote:

Actually that line is in the file just commented out and replaced with
chmod 755 /usr/local/bin/xastir

Thus for Dave VK4BDJ's benefit a simple edit of the update-xastir script
would fix the problem as long as update-xastir does not get changed with
each update.

Which would be the equal of a dog chasing its own tail endlessly.

73 Dave KB3EFS

On 06/17/2014 08:41 PM, David A Aitcheson wrote:

Curt/Tom,

This occurrence leads me to wonder if we should consider adding chmod
4755 /usr/local/bin/xastir as the last line (or near to the last line)
to the script ./update-xastir for the next release?

73
Dave
KB3EFS


On 06/17/2014 05:58 PM, David wrote:

Hi All..A couple of days ago i used ./update-xastir on my Linux
Mint 17
box update was ok but i found i couldnt access my AX25 tncport
socket: Operation not permitted message came up in terminal that i
started
it in..went round and round trying to find the answer..not too
much white hair to pull out

I had a thought about the chmod of xastir that was in the HowTo:AX25
from the Xastir web site...
went and did the chmod 4755 /usr/local/bin/xastir
and bingo i was back in business

obviously when i did the update it replaced the xastir bin file so
needed the chmod again..

them's the breaks .ive added this one in my notebook so i wont get
caught again

73 David VK4BDJ
___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir



___
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir