Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171103143900.GA2541@openwall.com>
Date: Fri, 3 Nov 2017 15:39:00 +0100
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: Security risk of server side text editing in general and vim.tiny specifically

On Fri, Nov 03, 2017 at 03:18:49PM +0100, Solar Designer wrote:
> I am not saying things are good as they are; I think they are not.  Like
> I say, people neither know nor want to know this, and it means they
> continue to do things insecurely.  I don't currently have a solution.

The closest to a solution I came up with so far (around year 2000, but
still unimplemented) is two programs - call them give(1) and take(1) -
for users to exchange files safely.  From users' perspective, these
would go along with write(1) and talk(1).  From sysadmin's perspective,
they'd be tools to use after using an unusually safe (allocating a new
pty, filtering terminal escapes) implementation of su(1) (actually, it
should become su(8), since no safe use of a "su" by a user is possible
anyway) to access the user(s)' account(s) (to copy a file between two
users, or between a user and root).

Implementation-wise, give(1) and take(1) could either rely on having a
shared directory with /tmp-like permissions on the same filesystem with
the users' home directories (and this would be rather specialized, not
addressing the need to easily share files that are not on /home) and use
of hard links, or they'd need a daemon like talkd(8) or reuse sshd(8).

And this last possibility brings us to what we can (and I sometimes do)
use already - setting up temporary SSH keys with forced "cat < ..." or
"cat > ..." commands, and using SSH for safely exchanging files by users
of the same host, or of different hosts for this matter.  It's just
manual setup each time, and we could want to provide convenient tools to
automate that.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.