[Bug 133635] Re: LTSPFS security is broken

2008-12-15 Thread Scott Balneaves
Gareth: > You will forgive me if I'm a little confused. > I know xprop, and I know roughly what X cookies are .. this doesn't sound > like a "major" fix. Well, for LTSPFS, it wasn't that major. The problem, at the time, was that LDM, the display manager, had no method for us to call out any ext

Re: [Bug 133635] Re: LTSPFS security is broken

2008-12-15 Thread Jordan Erickson
Gareth Bult wrote: > Just as a general note, when you're running a LTS version of Ubuntu with > 50 users on one server running LTSP in a live environment, the very LAST > thing you want to do is to upgrade the OS to fix a bug. (not least given > Ubuntu's track record on upgrades as already mentione

Re: [Bug 133635] Re: LTSPFS security is broken

2008-12-15 Thread Jordan Erickson
Thanks Scott, I was hoping someone like you would chime in and put some sense to it all. What you said was what I was trying to communicate with 'corner-case' since it has long been said to many that "LTSP-5 is the current version that you should be using." (straight from #ltsp on irc.freenode.

[Bug 133635] Re: LTSPFS security is broken

2008-12-14 Thread Gareth Bult
Your post; >>27 Aug 2007 >>Fix is in my tree. >>An mcookie is generated for the terminal, and set as an xprop during login. >>Client must pass correct mcookie for connect to happen. ... You will forgive me if I'm a little confused. I know xprop, and I know roughly what X cookies are .. this do

[Bug 133635] Re: LTSPFS security is broken

2008-12-14 Thread Scott Balneaves
As the person who fixed the bug, and who is responsible for LTSPFS upstream, allow me to interject. LTSPFS, or, for that matter, LTSP in the large, never had much of a security model. X was always launched without auth, LTSPFS had no security, etc. This is true for every version of LTSP from 1 t

[Bug 133635] Re: LTSPFS security is broken

2008-12-14 Thread Gareth Bult
Jordan, >Not that I know, but I don't think you understand the general process of using >your (limited) resources as >effectively as possible under a priority-based system for such an enormous >project as Ubuntu. You would be correct, the way in which Ubuntu seem to do things is beyond me. >B

Re: [Bug 133635]

2008-12-14 Thread Johnathon
This is aimed as much at myself as anyone else. Please remember the code of conduct, don't let this get heated: http://www.ubuntu.com/community/conduct/ -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of

[Bug 133635]

2008-12-14 Thread Johnathon
Jordan Erickson wrote: > Johnathon wrote: >> ... >> >> And, again, this bug was ignored for 4 and a half months, till the >> vulnerable release went EOL. >> >> Again, "Really _awesome_ security policy guys!" >> Again, "I'd expect that tactic from MS Windows, not from Ubuntu." >> >> I know you guys

[Bug 133635] Re: LTSPFS security is broken

2008-12-13 Thread Jordan Erickson
Not that I know, but I don't think you understand the general process of using your (limited) resources as effectively as possible under a priority-based system for such an enormous project as Ubuntu. I'm just a normal sysadmin and business owner, read: IANAP. But I do understand that given the va

[Bug 133635] Re: LTSPFS security is broken

2008-12-13 Thread Gareth Bult
Isn't it amazing how some people will still continue to defend the indefensible, just because their ears hurt. If Ubuntu were billed as a charity, I might tend to agree that people working for free shouldn't need to take any sort of hit for shoddy workmanship. Or, if Ubuntu were billed as "unfit f

Re: [Bug 133635] Re: LTSPFS security is broken

2008-12-13 Thread Jordan Erickson
Johnathon wrote: > ... > > And, again, this bug was ignored for 4 and a half months, till the > vulnerable release went EOL. > > Again, "Really _awesome_ security policy guys!" > Again, "I'd expect that tactic from MS Windows, not from Ubuntu." > > I know you guys are manically busy working on new

[Bug 133635] Re: LTSPFS security is broken

2008-12-13 Thread Johnathon
... And, again, this bug was ignored for 4 and a half months, till the vulnerable release went EOL. Again, "Really _awesome_ security policy guys!" Again, "I'd expect that tactic from MS Windows, not from Ubuntu." I know you guys are manically busy working on new features, I know back- porting

[Bug 133635] Re: LTSPFS security is broken

2008-12-13 Thread Jordan Mantha
Marked Feisty task as Won't Fix as Feisty is EOL ** Changed in: ltsp (Ubuntu Feisty) Status: Triaged => Won't Fix -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 133635] Re: LTSPFS security is broken

2008-12-13 Thread LumpyCustard
Could someone please set this at Won't Fix for feisty as it's no longer supported? -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bu

[Bug 133635] Re: LTSPFS security is broken

2008-07-24 Thread Oliver Grawert
dapper never had ltspfs support, seems feisty just slipped through, sorry for that, we will provide a fix for it asap (note that all newer releases have the fix included by default and that it really only affects users on the same server since ltspfs will only accept connections from the server ip

Re: [Bug 133635] Re: LTSPFS security is broken

2008-07-24 Thread Gareth Bult
There we go, I knew it wasn't just me getting pissed off with Ubuntu for no reason ... ;-) - Original Message - From: "Johnathon" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Sent: Thursday, July 24, 2008 8:45:06 PM GMT +00:00 GMT Britain, Ireland, Portugal Subject: [B

[Bug 133635] Re: LTSPFS security is broken

2008-07-24 Thread Johnathon
Really _awesome_ security policy guys! Ignore a hole, till the releases its in are out of support. You know, I'd expect that tactic from MS Windows, not from Ubuntu. -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of

[Bug 133635] Re: LTSPFS security is broken

2008-07-24 Thread Hew McLachlan
Ubuntu Edgy Eft is no longer supported, so a SRU will not be issued for this release. Marking Edgy as Won't Fix. ** Changed in: ltsp (Ubuntu Edgy) Status: Triaged => Won't Fix -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because yo

[Bug 133635] Re: LTSPFS security is broken

2007-11-05 Thread Johnathon
Hi, Is this going to be fixed in Fiesty/Dapper, which are both still in security support? (Our servers are running a mixture of Dapper, Edgy, Fiesty & Gusty, depending at what time they were put in, and whether they need to upgrade for new packages like apache 2.2) -- LTSPFS security is broken h

[Bug 133635] Re: LTSPFS security is broken

2007-09-10 Thread Kees Cook
This is vulnerable in feisty -- will you be able to backport a fix for 0.4.3-0ubuntu6 ? Thanks! ** Changed in: ltsp (Ubuntu Feisty) Importance: Undecided => Medium Assignee: (unassigned) => Scott Balneaves Status: New => Triaged ** Changed in: ltsp (Ubuntu Edgy) Importance: Und

[Bug 133635] Re: LTSPFS security is broken

2007-09-08 Thread Scott Balneaves
In ltspfs-0.5 ** Changed in: ltsp (Ubuntu) Status: Fix Committed => Fix Released -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing li

[Bug 133635]

2007-08-27 Thread Johnathon
Will this fix be ported to Feisty security-updates? It is quite a large security hole... Johnathon - "Scott Balneaves" <[EMAIL PROTECTED]> wrote: > Fix is in my tree. An mcookie is generated for the terminal, and set > as > an xprop during login. Client must pass correct mcookie for connect

[Bug 133635] Re: LTSPFS security is broken

2007-08-27 Thread Scott Balneaves
Fix is in my tree. An mcookie is generated for the terminal, and set as an xprop during login. Client must pass correct mcookie for connect to happen. Scott ** Changed in: ltsp (Ubuntu) Status: In Progress => Fix Committed -- LTSPFS security is broken https://bugs.launchpad.net/bugs/13

[Bug 133635] Re: LTSPFS security is broken

2007-08-27 Thread Kees Cook
Hi! How is this coming along? -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/m

[Bug 133635] Re: LTSPFS security is broken

2007-08-21 Thread Scott Balneaves
** Changed in: ltsp (Ubuntu) Status: Confirmed => In Progress -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists

[Bug 133635] Re: LTSPFS security is broken

2007-08-20 Thread Scott Balneaves
We've just discussed this in #ltsp. The old LTSP used the xauth key, but this broke because of ssh forwarding. We'll fix this, and get it going. I'll work on it tonight. Scott ** Changed in: ltsp (Ubuntu) Assignee: (unassigned) => Scott Balneaves Status: Invalid => Confirmed --

[Bug 133635] Re: LTSPFS security is broken

2007-08-20 Thread Johnathon
I can confirm this one here. Interestingly enough, ltspfsd depends on ltsp-client, which fails to install (leaving a broken dependency on the system), but ltspfsd works fine anyway. -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you

[Bug 133635] Re: LTSPFS security is broken

2007-08-20 Thread Gareth Bult
To reproduce on a random workstation (taken from my Bash session); sudo apt-get install ltspfsd modprobe fuse ltspfs 10.1.0.220:/var/run/drives /mnt/root df -> ltspfs 45244044452396 1% /mnt/root ls -la /mnt/root/usbdisk-sdc1 total 384 drwxr-xr-x 2 root root 204

[Bug 133635] Re: LTSPFS security is broken

2007-08-20 Thread Gareth Bult
Ok, if I boot a thin client (without logging in or doing anything clever) on the server (or indeed any intelligent machine on the network) I can do the following; ltsp :/var/run/drives /mnt/localdev/mountpoint And I have full access to the client's device , USB key in this case ... ?? -- LTSPFS

[Bug 133635] Re: LTSPFS security is broken

2007-08-20 Thread Oliver Grawert
to do what ? connecting to that port is pointless if you dont know the names and paths for the exported filesystems ltspfsd is offering ... -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received this bug notification because you are a member of Ubuntu Bugs, which is th

[Bug 133635] Re: LTSPFS security is broken

2007-08-20 Thread Gareth Bult
As part of the boot process, the thin client runs; /usr/bin/ltspfsd -a At this point, it is listening on 0.0.0.0:9220. Anyone on the network or the server can then access this port via the thin client's native IP address. ?? -- LTSPFS security is broken https://bugs.launchpad.net/

[Bug 133635] Re: LTSPFS security is broken

2007-08-20 Thread Oliver Grawert
in ltsp5 ltspfs uses the ssh tunnel ldm establishes instead of the internal xauth mechanism, the -a option is for backwards comaptibility with ltsp 4.x only ** Changed in: ltsp (Ubuntu) Status: New => Invalid -- LTSPFS security is broken https://bugs.launchpad.net/bugs/133635 You received

[Bug 133635] LTSPFS security is broken

2007-08-20 Thread Gareth Bult
Public bug reported: By default on Fiesty the ltspfs daemon is started with a "-a" , which turns off Magic Cookie authentication. In this mode, ltfsp works fine for me, I can see and mount USB and CDROM's not problem. Trouble is, so can anyone else on the server. If I remove the "-a", mounting