Thanks!

Am 11.05.21 um 20:04 schrieb Jim Jagielski:
> Done
>
>> On May 11, 2021, at 1:53 PM, Jim Jagielski <j...@jagunet.com> wrote:
>>
>> Will do... 
>>
>>> On May 10, 2021, at 2:49 PM, Marcus <marcus.m...@wtnet.de> wrote:
>>>
>>> Am 06.05.21 um 15:50 schrieb Matthias Seidel:
>>>> Am 06.05.21 um 15:08 schrieb Jim Jagielski:
>>>>> Once we tag HEAD of AOO41X to AOO4110
>>>> Can't wait! ;-)
>>>> I have dozens of commits to be backported to AOO41X...
>>> @Jim:
>>> Can you please create the release tag from the 41X branch? Then we can 
>>> close the relase schedule for 4.1.10.
>>>
>>> Thanksa
>>>
>>> Marcus
>>>
>>>
>>>
>>>>>> On May 6, 2021, at 8:28 AM, Matthias Seidel <matthias.sei...@hamburg.de> 
>>>>>> wrote:
>>>>>>
>>>>>> Hi all,
>>>>>>
>>>>>> Just a pragmatic question:
>>>>>>
>>>>>> When do we want to start working on AOO 4.1.11?
>>>>>>
>>>>>> The sooner we branch it, the sooner we can do Test builds and let people
>>>>>> see if their problem is fixed...
>>>>>>
>>>>>> Matthias
>>>>>>
>>>>>> Am 05.05.21 um 23:31 schrieb Peter Kovacs:
>>>>>>> On 05.05.21 22:11, Arrigo Marchiori wrote:
>>>>>>>> Hello Peter, all,
>>>>>>>>
>>>>>>>> On Wed, May 05, 2021 at 05:44:17PM +0000, Peter Kovacs wrote:
>>>>>>>>
>>>>>>>>> On 05.05.21 14:37, Arrigo Marchiori wrote:
>>>>>>>>>> Hello,
>>>>>>>>>>
>>>>>>>>>> On Wed, May 05, 2021 at 07:08:11AM +0000, Peter Kovacs wrote:
>>>>>>>>>>
>>>>>>>>>>> The best approach I believe is to add a whitelist feature as for
>>>>>>>>>>> macro
>>>>>>>>>>> files.
>>>>>>>>>>>
>>>>>>>>>>> Users can add then the links they wish to approve.
>>>>>>>>>> Do you mean file-based whitelists instead of target-based?
>>>>>>>>>>
>>>>>>>>>> I will try to explain myself better: the current filter on AOO 4.1.10
>>>>>>>>>> is target-based, because it is the target of the link that triggers
>>>>>>>>>> the warning. Are you suggesting to add a whitelist based on files, 
>>>>>>>>>> for
>>>>>>>>>> example "allow any links in documents from this directory"?
>>>>>>>>>>
>>>>>>>>>> If so, would you use the same whitelist as for macros, or would you
>>>>>>>>>> introduce another one?
>>>>>>>>> I do not think that it makes sense to allow
>>>>>>>>> https://my.payload.crime/AOO_diskscrambler.ods to be seen as save
>>>>>>>>> target for
>>>>>>>>> opening and macro execution at the same time.
>>>>>>>>>
>>>>>>>>> Better is to have both separated. And the simple practicable
>>>>>>>>> solution is to
>>>>>>>>> just add an own list which allows targets to be listed.
>>>>>>>> I see.  But please let us distinguish targets and sources.
>>>>>>> Well, yea this is a nice abstraction I did not make. Good one.
>>>>>>>> The macros' whitelist contains _directories_ (I don't really like
>>>>>>>> calling them folders, I hope you don't mind) whose files are trusted,
>>>>>>>> with respect to macro execution.
>>>>>>> sure. Names are sound and smoke ;) - sorry can not resist this german
>>>>>>> IT idiom.
>>>>>>>> In your reply above you seem to discuss a whitelist of _link targets_?
>>>>>>>> Not documents, containing links that shall always be followed?
>>>>>>> Yes, I thought on the target of the link. For me was this the
>>>>>>> important trait.
>>>>>>>
>>>>>>> However if I think in which document I grant the security level. Hmm,
>>>>>>> I think this makes the whole concept a lot easier.
>>>>>>>
>>>>>>> Plus we would then one list. So we extend an existing feature.
>>>>>>>
>>>>>>>>> If we would want to have a vision, where we should develop to, this
>>>>>>>>> would be
>>>>>>>>> mine:
>>>>>>>>>
>>>>>>>>> We have One list and 2 properties. 1 property for hyperlink
>>>>>>>>> whitelisting,
>>>>>>>>> the other one for (macro) execution. I like our 4 security stages.
>>>>>>>> The four security levels currently available for macros, if I
>>>>>>>> understand correctly, are based on a combination of:
>>>>>>>>
>>>>>>>>  - digital signatures of the macros (signed or not),
>>>>>>>>  - trust of certain digital signatures (certificate trusted or not),
>>>>>>>>  - position of the document (directory whitelisted or not).
>>>>>>>>
>>>>>>>> This is... quite complex IMHO.
>>>>>>> That why I have written it is maybe a vision. And maybe it is to much.
>>>>>>>> Did you refer exactly to this model?
>>>>>>> yes kind of. I thought that a hyperlink has some sort of certiicate
>>>>>>> and an macro can have some certification and that is kind of the same
>>>>>>> thing...
>>>>>>>> Or
>>>>>>>> shall we rather adopt a simpler one for links, for example only
>>>>>>>> considering the directories whitelist?
>>>>>>> Now that I think on your approach I think we should only look at the
>>>>>>> directory that the document has been opened from. But still I would
>>>>>>> still rather configure it per directory, then in a general and work
>>>>>>> with exclusions.
>>>>>>>
>>>>>>> However this is maybe not so smart to implement now, since our profile
>>>>>>> is not robust enough. It will break eventually, and then all nice
>>>>>>> settings are lost. And that is not something I would like to have.
>>>>>>>
>>>>>>>> And to understand better: does AOO allow to sign individual macros? Or
>>>>>>>> just the document containing them? I don't think that it allows to
>>>>>>>> sign individual links within a document.
>>>>>>> No it would not sign individual links on the document.- But don't we
>>>>>>> have document signing?
>>>>>>>
>>>>>>> For links we could check if the document is signed.
>>>>>>>
>>>>>>>
>>>>>>> So summing up:
>>>>>>>
>>>>>>> # Instead of checking where the hyperlink is refering to, only check
>>>>>>> where the document has been stored. (Treat hyperlinks as macros so to
>>>>>>> say.)
>>>>>>>
>>>>>>> # As an enhancement we could add a model that checks for the nearest
>>>>>>> applicable path to the document, and applies that rule.
>>>>>>>
>>>>>>>>> Example for a customized setup on a POSIX filesystem (security level
>>>>>>>>> 3 =
>>>>>>>>> very high and 0 = low; first value is hyperlink, second value is macro
>>>>>>>>> execution of this origin):
>>>>>>>>>
>>>>>>>>> /tmp  (3,3) => Everything in the temp folder does not open links or
>>>>>>>>> execute
>>>>>>>>> macros
>>>>>>>>>
>>>>>>>>> ~/ (2,2) => something that is within the home path, but not a folder
>>>>>>>>> listed
>>>>>>>>> below, may execute signed macros or open targets that have a trusted
>>>>>>>>> certificate
>>>>>>>>>
>>>>>>>>> ~/Downloads (2,3) => Downloads may open Links with a trusted
>>>>>>>>> certificate but
>>>>>>>>> not allow to execute any macros
>>>>>>>>>
>>>>>>>>> ~/onlymystuff (0,0) => this is my documents and I allow everything
>>>>>>>>> possible
>>>>>>>>> here.
>>>>>>>>>
>>>>>>>>> ~/macro_examples (3,1) => delivered example I do not want them to
>>>>>>>>> execute,
>>>>>>>>> but they may be not linked by another document.
>>>>>>>>>
>>>>>>>>> ftps://securecontent.org ( 2,2) => this links pointing to this
>>>>>>>>> target are
>>>>>>>>> opened, and the downloaded file may execute macros if they are
>>>>>>>>> signed with a
>>>>>>>>> trusted key.
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
>>> For additional commands, e-mail: dev-h...@openoffice.apache.org
>>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
>> For additional commands, e-mail: dev-h...@openoffice.apache.org
>>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
> For additional commands, e-mail: dev-h...@openoffice.apache.org
>
>

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to