Sarcasm accepted. Thank you.

On Thu, Apr 04, 2013 at 02:54:41PM -0400, Rob Weir wrote:
> Sorry for talk posting.  I get it now.  If AOO is more secure than other
> Apache projects than this may give the impression that the other projects
> are less secure because they do not take these precautions.  No project can
> be better than others since that implies some are worse.  So any attempt to
> improve must be resisted since it reflects poorly on the projects that
> don't.
> 
> I apologize for not noticing this before.  I understand completely.  It is
> a very human reaction.   I guess I'll just wait for the time to come for
> other projects to figure this out, through whatever painful lessons await
> them, so we can then move forward together, at the same pace.
> 
> -Rob
> 
> 
> On Thu, Apr 4, 2013 at 2:33 PM, Rob Weir <robw...@apache.org> wrote:
> 
> >
> >
> >
> > On Thu, Apr 4, 2013 at 2:10 PM, Greg Stein <gst...@gmail.com> wrote:
> >
> >> Also, let me say one more thing:
> >>
> >> This notion of creating divisions among committers ... it is "solving"
> >> a problem that has never occurred here.
> >>
> >> NEVER. OCCURRED.
> >>
> >>
> > So frickin' what?  That is entirely irrelevant.   My house has never burnt
> > down either, but I still don't leave open flames around unattended.  In
> > fact you might think this is naive view, but avoidance of such risks might
> > even be correlated with lack of house fires.  Hmmm....
> >
> >
> >
> >> In the Foundations's 14+ year history, we have never seen a trojan
> >> commit. Our servers have been compromised a handful of times. When we
> >> were back on CVS, we even had to audit source control to verify no
> >> trojan injection. But we have NEVER had a case of a malware commit.
> >>
> >>
> > Again, that proves nothing.   I'm sure the first time apache.org was
> > rooted that it had never happened before either, right?
> >
> >
> >
> >
> >> So back to IMO: dividing and partitioning and separate privilege
> >> levels... there is no reason. It creates a social problem to "solve" a
> >> non-existent issue. Net result: more problems.
> >>
> >>
> >
> > Greg, we already do this.  Does every ASF Member have credential for Infra
> > root?  Does ever ASF Member have access to legal-private mailing list.  No.
> > No. We even do this in the AOO project, with separate authz for
> > openoffice-security, which by the way also includes an SVN tree.
> >
> > Anyone who thinks this is a question of dividing and privilege is
> > expressing a knee-jerk reaction, without thinking of the risks.  We should
> > avoid regurgitating platitudes.  Remember, we're talking about people who
> > have never committed code, who don't even know C, who are not even
> > subscribed to the dev mailing list, and in some cases have never ever
> > posted to our mailing lists.  They signed up in with the podling in July
> > 2011 and then were never heard of again.  You make an extremely weak
> > argument to pontificate about "privilege" here.
> >
> > The risks are real.  High profile open source projects attract these kinds
> > of attacks.  There are those who know it, and those who don't know it yet.
> >
> > A good read:
> > http://www.securityweek.com/linux-source-code-repository-kernelorg-gets-hacked
> >
> > As for those who think that casual review of commit messages will review
> > any attack, that is a dangerously naive few.  We should not expect an
> > attack to be in a filed called trojan.c with comments and clear logic
> > explaining what the code does.  Any hacker with a clue would send a patch
> > backed by a reasonable defect report in Bugzilla that would be innocuous to
> > casual inspection.  All you need is a buffer or stack overwrite in a
> > well-placed area to cause the problem.  This might even be done in two
> > stages, spread out over time, so the impact is not detectable without
> > looking at the pieces together.
> >
> > Now if someone did that in the name of an active committer it would be
> > *immediately* detected.  "WTF!?  I didn't check that in!"  But when done in
> > the name of an unactive committer it would be less likely to be noticed for
> > what it is.  We might check twice, but that doesn't mean we'd catch all or
> > even most deliberate attacks.   But whatever detection rate we would have
> > there it would be far less than the presentation rate for not having
> > authorization enabled at all.  The prevention rate there is 100%
> >
> > Regards,
> >
> > -Rob
> >
> >
> >
> >
> >
> >> Cheers,
> >> -g
> >>
> >> On Thu, Apr 04, 2013 at 05:59:31PM +0000, Greg Stein wrote:
> >> > Speaking as one of those "old-hands", Dennis is absolutely spot-on.
> >> >
> >> > Partitions, barriers, sub-groups... I call those "divisive" mechanisms
> >> > which serve to divide the community. Such divisions are rarely needed.
> >> >
> >> > As Andrea points out, in Subversion's 13 year history, we have only
> >> > *requested* people observe certain fences. We have never had a
> >> > problem. We have never had to take sanctions. A stray commit here and
> >> > there? Sure, it has happened, with the best intent, so we just point
> >> > out that they need a bit more caution. No harm done.
> >> >
> >> > Back to Dennis' point: the solution here is proper review of the
> >> > commits that occur. (IMO) NOT a way to *exclude* or to *limit* the
> >> > potential contributions of others.
> >> >
> >> > Cheers,
> >> > -g
> >> >
> >> > On Thu, Apr 04, 2013 at 09:23:39AM -0700, Dennis E. Hamilton wrote:
> >> > > In previous generations of this kind of discussion, the ASF old-hands
> >> will point out that the social process works quite well, folks don't do
> >> commits unless they feel qualified to do so, and it is often the case that
> >> committers will request RTC (i.e., submit patches rather than update the
> >> SVN) in contributing where they are not experienced or don't consider
> >> themselves expert.
> >> > >
> >> > > At the ASF this appears to be one of those, "if it is not broken,
> >> don't fix it."
> >> > >
> >> > > There is still the concern about stolen credentials used to perform
> >> undetected malicious acts.  If the oversight that the project naturally
> >> brings to bear on visible changes to the code base is insufficient, I think
> >> the problem is greater than there being a possible exploit of that
> >> inattention.  Mechanical solutions may be part of the disease, not the cure
> >> [;<).
> >> > >
> >> > >  - Dennis
> >> > >
> >> > > -----Original Message-----
> >> > > From: Andrea Pescetti [mailto:pesce...@apache.org]
> >> > > Sent: Thursday, April 04, 2013 08:57
> >> > > To: dev@openoffice.apache.org
> >> > > Subject: Re: Proposal: Improve security by limiting committer access
> >> in SVN
> >> > >
> >> > > Dave Fisher wrote:
> >> > > > Let's focus only on adding one new authz list for the code tree.
> >> > > > Call it openoffice-coders and populate it with those who HAVE any
> >> > > > commit activity in the current code tree.
> >> > >
> >> > > I checked feasibility with Infra. Summary:
> >> > >
> >> > > 1) LDAP is not the solution. Rule it out.
> >> > >
> >> > > 2) The only possible solution would be an authz rule like suggested by
> >> > > Dave here; however, Infra quite discourages it, mainly for maintenance
> >> > > reasons. This leads me to think we would need some good justifications
> >> > > for implementing this.
> >> > >
> >> > > 3) If the justification is security, then there are other privileges
> >> to
> >> > > monitor. Namely, every committer has shell access to
> >> people.apache.org,
> >> > > authenticated access to the Apache SMTP server and CMS privileges for
> >> > > the openoffice.org website, including publish operations.
> >> > >
> >> > > For the record, the Subversion project has complex rules like Rob
> >> > > pointed out; but it's only a "social enforcement", i.e., all
> >> committers
> >> > > respect those limitations by their own choice; if you look at the
> >> > > technical level, every committer (all Apache committers) can commit
> >> code
> >> > > to the Subversion subtree.
> >> > >
> >> > > Regards,
> >> > >    Andrea.
> >> > >
> >> > > ---------------------------------------------------------------------
> >> > > To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
> >> > > For additional commands, e-mail: dev-h...@openoffice.apache.org
> >> > >
> >> > >
> >> > > ---------------------------------------------------------------------
> >> > > To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
> >> > > For additional commands, e-mail: dev-h...@openoffice.apache.org
> >> > >
> >> >
> >> > ---------------------------------------------------------------------
> >> > To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
> >> > For additional commands, e-mail: dev-h...@openoffice.apache.org
> >> >
> >>
> >> ---------------------------------------------------------------------
> >> To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
> >> For additional commands, e-mail: dev-h...@openoffice.apache.org
> >>
> >>
> >

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
For additional commands, e-mail: dev-h...@openoffice.apache.org

Reply via email to