[EMAIL PROTECTED] wrote:
Ever heart of a multiuser system where one user shouldn't be able to
acces the files of another user? Not all users are thinking about this
issue and many forget to change the modes for confidential files. IMO,

But keeping confidential files on "true" multiuser systems is stupid ...

I disagree, How about a heavy build server for different projects?
Or shared (insert word)-solutions. You cannot be to careful with your
files, one day, as normal user, you will forget to chmod() that file ...

Whenever you configure a box like that, you will (have to) put more thought into it in the first place. You cannot assume that a default installation of any general purpose OS, including OpenBSD, can serve each and every possible purpose right out-of-the-box. There has to be done some careful, custom configuration. The cleanliness and lack of nasty surprises in OpenBSD might make this easy (or at least easier) to implement, but the design part is always the same. It's just as with pf - the way it works, syntax etc, is easy to understand and use, but in the end it also just does what it's told to do ... and if that part is flawed, the result will be flawed as well.

I have yet to find an "insane" default setting in OpenBSD. It all makes perfect sense, and it's wonderfully simple to go into any direction from these defaults. I see no reason in changing them into what's more suitable for special cases. The things you mention are/can be pretty large projects.

Paranoia never really helps security -- all it can do is prevent people from thinking straight... or worse, make them alter paranoid default settings into utterly insecure ones just to get things working again - depending on whose paranoia needs to be dealt with. In my opinion, the OpenBSD folks are walking a fine line here and doing a good job at that.

IMNSHO. And you cannot hide anything from the administrator. You depend
on how well the admin is capable of securing the rest of the system and
not have it rooted by a 3rd party(*) including the other users.

Then you shouldn't use the system at all. It is not because something
might be/become a flaw, that you don't have to care about the rest.
Every extra layer of defence _does_ protect you from a subset of attacks,
even how small that subset is, it counts.

As for how far trust goes, this needs to be figured out on a case-by-case basis. You trust because something is made trustworthy - for example through transparency in what way security is enforced. But this digresses from talking about default settings, and in this regard there might've been a misunderstanding.

I did not mean to not care about the rest, but you cannot expect most or all of it from a default installation. I hope my explanation above is clearer. The fine line is to have things secure but not paranoid (and thus dysfunctional for the majority of users.) I disagree with the proposed changes to /etc/skel, because I believe that what we have here is perfectly suited for most people, and easy enough to work with for those who have special needs.

shell server. Who says that the admin is any more trustworthy than some
other, regular users?

They are not, but most of the time they give you confidential information
that you must use on that box that you use for stuff other users may
not access, like database/pop3 information.

Huh, why would I give shell access (or even a system account) to anyone but fellow admins on a database or mail server in the first place? From a user perspective, I for one would rather Post-It[tm] complicated and unmemorizeable credentials to my monitor(*) where I have at least some idea about who might get to see them instead of putting them into my home directory on my own server at home, let alone some server someplace else.


Moritz

*: Just like some well-known security guy, whose name I forgot, suggested recently ... might've been a TheRegister article pointing to it.

Reply via email to