From: Stephen Horne on
On Mon, 28 Dec 2009 13:11:43 +0100, houghi <houghi(a)houghi.org.invalid>
wrote:

>Stephen Horne wrote:
>> Just for the record, though, which of the following would your little
>> sister be better equipped to cope with...
>>
>> 1. Answering "Thunderbird wants internet access - yes or no?"
>>
>> 2. Configuring the OpenSUSE firewall.
>
>Neither. System access should NOT be done on a user level. Not by me
>and not by my little sister.
>
>To me there is a HUGE difference between "Me, the user" and "Me, the
>system administrator"

And this means that you can never decide which applications should be
allowed to access the internet, irrespective of which hat you happen
to be wearing?

Why?

I repeat - I'm not asking to clone ZoneAlarm or the Windows way. I
just want to prevent applications from accessing the internet without
my explicit permission. I'm quite happy to make those whitelisting
decisions while wearing my system admin hat, and I agree that it's a
necessity for the thing to really be secure.

But even if blocking/unblocking internet access was done with no admin
password needed, as is generally the case on home Windows boxes, it's
still more secure than *always* allowing *all* applications to access
the internet.

From: David Bolt on
On Monday 28 Dec 2009 10:39, while playing with a tin of spray paint,
Stephen Horne painted this mural:

> On Mon, 28 Dec 2009 10:06:39 +0100, houghi <houghi(a)houghi.org.invalid>
> wrote:
>
>>Stephen Horne wrote:

>>> The scenario I have in mind is a trojan. I download it, mess around
>>> with it within a user account, and don't realise that it has (e.g.)
>>> scanned the files in my user account, spotted some passwords/bank
>>> details/personal info, and phoned home.

Why would you be messing around with a trojan under your own user
account? If you're that concerned, set up a separate user account and
use it either for messing about with programs of unknown provenance,
or use it for your banking stuff. If you really want to go one step
further, encrypt the home for that user.

>>Well, it can also just maill home and thus use the programs where you
>>already have opend the ports for. It could use firefox or whatever
>
> And these are also things that it shouldn't be allowed to do without
> my explicit permission.

How would cron be able to ask you for permission to send you a mail
detailing the results of a job it's just run?

>>Sure you can play arround and even have a user account, but do it with
>>moderation and limitation. e.g. see that that user does not have access
>>to the outside world. Wether sandboxing is enough or using a virtual
>>manager (or both) I am not sure.
>
> Finally, we are getting somewhere ;-)
>
> Right - so are you saying that it's possible to set up a "sandbox"
> user account with no internet access allowed?

Yes, but you won't be able to do so without using iptables directly.
All it takes is adding a rule that DROPS packets from a specific UID or
GID. You could easily stop all users from accessing the net. It would
probably make things quite unusable for them, since you'd need to
prevent access to localhost as well, or they could use the mail server
to send mail without asking your permission.

While it's pretty old, this should give you an idea of how to do that:

http://www.linuxjournal.com/article/6091

>>I would say that a virtual manager with no network is the most safe
>>enviroment in your case as well as the easiest to do.
>
> Maybe, but on my less than awe inspiring machine, I want to limit the
> number of layers of virtualisation if possible.

I've run Parallels on an old Athlon, 1.2GHz with either 512 or 768MB
IIRC, and it was pretty usable. It was slower than running the OS
directly on the hardware, but not that much slower. I also used VMware,
which was a faster on the same hardware, and that made it feel it was
running at about the same speed it would have been if it was running
directly on the hardware. Now I use Virtualbox, mostly on this X2
5200+ machine, and there doesn't seem to be any noticeable slowdown
even when the system is under load.


Regards,
David Bolt

--
Team Acorn: www.distributed.net OGR-NG @ ~100Mnodes RC5-72 @ ~1Mkeys/s
openSUSE 11.0 32b | | openSUSE 11.2 32b |
openSUSE 11.0 64b | openSUSE 11.1 64b | openSUSE 11.2 64b |
TOS 4.02 | openSUSE 11.1 PPC | RISC OS 4.02 | RISC OS 3.11
From: Peter Köhlmann on
Stephen Horne wrote:

> On Mon, 28 Dec 2009 13:11:43 +0100, houghi <houghi(a)houghi.org.invalid>
> wrote:
>
>>Stephen Horne wrote:
>>> Just for the record, though, which of the following would your little
>>> sister be better equipped to cope with...
>>>
>>> 1. Answering "Thunderbird wants internet access - yes or no?"
>>>
>>> 2. Configuring the OpenSUSE firewall.
>>
>>Neither. System access should NOT be done on a user level. Not by me
>>and not by my little sister.
>>
>>To me there is a HUGE difference between "Me, the user" and "Me, the
>>system administrator"
>
> And this means that you can never decide which applications should be
> allowed to access the internet, irrespective of which hat you happen
> to be wearing?
>
> Why?
>
> I repeat - I'm not asking to clone ZoneAlarm or the Windows way. I
> just want to prevent applications from accessing the internet without
> my explicit permission.

Fine. Chose to ignore the advice "run it in a VM" and pull that idiotic
"ZoneAlarm" card some more. You look exaclty like that clueless wintendo
luser you are

> I'm quite happy to make those whitelisting
> decisions while wearing my system admin hat, and I agree that it's a
> necessity for the thing to really be secure.

No, whitelisting and other incompetent measures will not make any firewall
"secure".

> But even if blocking/unblocking internet access was done with no admin
> password needed, as is generally the case on home Windows boxes, it's
> still more secure than *always* allowing *all* applications to access
> the internet.

Which is bullshit and wishful thinking.
You are actually *less* secure because of that false "security feeling"

A firewall has *no* business knowing which *apps* want access. Because it
has no idea (like you don't) if it is really the app or some malware from
behind
--
I refuse to have a battle of wits with an unarmed person.

From: Peter Köhlmann on
Stephen Horne wrote:

> On Mon, 28 Dec 2009 10:47:26 +0100, Peter Köhlmann
> <peter-koehlmann(a)t-online.de> wrote:
>
>>This is the dumbest idea ever which came into the windows world: To let
>>the user handle the decision if some arbitrary program which *claims* to
>>be program xyz can access the outside world.
>
> No - the dumbest idea ever in the Windows world was a lot dumber than
> that. Given the shear number and scale of the dumb decisions in
> Windows, I'm not even going to speculate about which features are in
> the running.
>
> On a machine where there is only one user, though, who else are you
> going to ask? You can question the *way* that the question is asked,
> certainly. But *someone* has to decide what is permitted and what
> isn't.

Right. And asking the ZoneAlarm way is for imbeciles

>>It has not worked a tiny little bit in windows, and it will not work
>>anywhere else. It is just plain stupid to even try it that way
>
> If the idea of asking at the time is really so dumb, then why is it OK
> for Linux apps to request the root password when they need extra
> priviledges?

Well, because they need them? Whenever the user is not knowing what he is
doing he has no business knowing the root password. It's as simple as
that. Because, unlike on windows, there are *no* apps a normal user would
run which need the root password. None

What gives you the idea that there are linux apps which need root
priviledges that any normal user would run? Why do you know so extremely
little about linux, yet want ZoneAlarm toys introduced?

> And lets be honest - the ZoneAlarm approach, flawed as it is, works a
> whole lot better than having no restrictions at all on which
> applications can access the internet.

No. It provides a false sense of "security". Which is a lot worse than
knowing that there is no security
--
Just out of curiosity does this actually mean something or have some
of the few remaining bits of your brain just evaporated?

From: Stephen Horne on
On Mon, 28 Dec 2009 14:01:26 +0100, houghi <houghi(a)houghi.org.invalid>
wrote:

>Stephen Horne wrote:
>> On a machine where there is only one user, though, who else are you
>> going to ask? You can question the *way* that the question is asked,
>> certainly. But *someone* has to decide what is permitted and what
>> isn't.
>
>When I just came from Windows 95 to Linux, that is what I thought as
>well. However I learned that is is much easier to understand that there
>are always two users on a machine. root and user.

Please point out any part of any of my posts that indicates that I
don't understand this.

I want to be able to prevent untrusted apps from accessing the
internet without my explicit permission.

Where in that sentence does it say "I must be able to make these
choices without supplying a root password".

That's right - I never made any such request. I even said that I wish
ZoneAlarm *did* ask for a password. True I didn't say "root password"
but what sense would that make on Windows?

Now - exercise two - point out exactly where I said "Windows good
Linux bad".

That's right - I never said that.

>> And lets be honest - the ZoneAlarm approach, flawed as it is, works a
>> whole lot better than having no restrictions at all on which
>> applications can access the internet.
>
>Sure, a bit is better then nothing. This ONLY goes if you understand the
>limitations and what goes on. Many people don't and think that because
>zonealarm offers an option, that that option is safe. It isn't.

Exercise three - point out where I said "ZoneAlarm good Linux bad".

That's right - I never said that either. In fact I rather think I said
the opposite several times.

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12
Prev: Do I have a Virus?
Next: making an rpm package