Hi all,

thank you all for this long discussion. Your security concerns are clear, as is 
clearer the intended system-usage scenario (most of you have) and Mutt's role 
in there.

The difference between us is basically that I prefer that the user have the 
*possibility* to do it in the "wrong" way after being warned about 
consequences. Of course sane/secure defaults are a must.

Your code, your rules - and thats all right. 

Best regards,
Martin Sacha


On 20200813 1807, Derek Martin wrote:
> On Thu, Aug 13, 2020 at 10:03:43PM +0200, Vincent Lefevre wrote:
> > On 2020-08-11 22:29:41 -0500, Derek Martin wrote:
> > > The subversion example is a special case of an application that you
> > > use through a web server, that has its own security implications.
> > 
> > Wrong! Subversion does not need a web server.
> 
> I didn't say it was required, and it makes absolutely zero difference:
> in your use case you're using your second user to run svnserve--a
> network service--which is functionally equivalent to the webserver for
> this use case.  This is standard security practice for a running
> service.  You're not supposed to USE that user, and that's actually
> the point of having the separate user...  If you are you may as well
> have just used your normal user, because you're missing the point. 
> 
> Then, when you do your checkout, the files will be owned by and
> accessible to your main user, not the second user that svnserve is
> running as.  There is absolutely no cause for the files to be
> group-accessible.  It's absolutely nothing like your silly contrived
> attachment-sharing use case.
> 
> In fact the second user is not yours at all...  it belongs to the
> subversion repository/service, much as the www-data user belongs to
> the web server... not YOU.  You can see this more clearly if you
> imagine a second human added to your system who will also access the
> same repository using the same mechanism and user, and a separate
> sysadmin who set this all up for you.  And I don't care if that's not
> how you'd do it--you COULD, and it illustrates the point.
> 
> And TBH even the svnserve case is a bit silly (over-paranoid), it
> provides very little (but yes, some) extra protection.  You'd do just
> about as well if you never run unstable SVN code and never interact
> with your repository any way other than by using svn commands. A
> fairly easy way to avoid trashing it accidentally with something like
> rm -rf is to put the repository in a very different path from your
> home directory or other file store you commonly use, where you have no
> reason to be running shell commands.
> 
> > > It's nothing like using multiple users on your system to do different
> > > tasks, like reading your e-mail with one user, and then handling
> > > attachments with a different one.
> > 
> > Correction: reading e-mail and handling attachments with one uid,
> > but also being able to access saved attachments with another uid.
> 
> It's not a correction, those things are equivalent. It's still
> superfluous because having multiple users that you're USING is just
> idiotic.  Switching between users to get things done is going to get in
> your way a lot more often than just group perms on e-mail attachments,
> so if you want a configurable umask in Mutt because you're running
> with this insane use case, for the diminutive boost of efficiency
> gained by not having to run chmod on the attchments you actually want
> to share, then you've missed the forest for the trees.
> 
> That's why absolutely no one actually does this, without also being
> completely insane... or at least completely misunderstanding what
> they're doing and why.
> 
> > Note: Even without a sandbox, one does not absolutely need to make
> > attachments group accessible. The main account could do a SSHFS mount
> > of the directory that contains the saved attachments. But allowing
> > to control the permissions of the attachments inside Mutt would avoid
> > the need for SSHFS.
> 
> Or just use chmod.  Or write a script with a one-character name that
> you can run any time you want, to chmod all the files in your
> attachments directory, *once you've determined the attachments in a
> hard-coded directory have nothing sensitive in them*, if chmod is so
> troublesome for you.  Or...stop being insane enough to have a use case
> that's so contrived and completely ridiculous.
> 
> [I also really want to know who is sending/receiving all these copious
> amounts of file attachments that occasionally running chmod on the
> ones you actually want to share with someone on the same system is
> such a bother...]
> 
> Bottom line:  Sharing potentially sensitive data that came to your
> inbox should ALWAYS be a forced choice, so that you don't accidentally
> make your banking info or medical history etc. available to everyone
> on your system, or your raise and bonus info that your boss just
> e-mailed you gets shared with your coworkers (or whatever).  It should
> NEVER be the default, and you're just plain wrong if you think it
> should be, even by your own choice.  If there's no one else on your
> system, and you're not doing something completely idiotic, then it's
> entirely a non-issue; and if there are other users on your system, you
> DO NOT WANT THIS, even if you think you do.  You can do it and it will
> be totally fine... right up until that one time it isn't, at which
> point you'll finally understand this.  Michael did, which is why he
> wrote it that way.  Thomas did, which is why he adamantly and
> explicitly protected Michael's decision (when at the time, I myself
> did not), and so did Brendan.  And thus far, so too has Kevin.
> 
> I'm done with this thread.  You're just wrong, and I think you know
> it.
> 
> -- 
> Derek D. Martin    http://www.pizzashack.org/   GPG Key ID: 0xDFBEAD02
> -=-=-=-=-
> This message is posted from an invalid address.  Replying to it will result in
> undeliverable mail due to spam prevention.  Sorry for the inconvenience.
> 


Attachment: signature.asc
Description: PGP signature

Reply via email to