public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
From: Fernando Rodriguez <frodriguez.developer@outlook.com>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] portage directory ownerships?
Date: Wed, 16 Sep 2015 03:51:51 -0400	[thread overview]
Message-ID: <BLU436-SMTP5858DBEA300A883B8612188D5B0@phx.gbl> (raw)
In-Reply-To: <55F905D4.1060109@gmail.com>

On Wednesday, September 16, 2015 8:01:56 AM Alan McKinnon wrote:
> On 16/09/2015 00:36, Fernando Rodriguez wrote:
> > On Tuesday, September 15, 2015 10:25:15 PM Alan McKinnon wrote:
> >> On 15/09/2015 22:09, james wrote:
> >>> Hello,
> >>>
> >>> So looking at /etc/portage/repos.conf, it seems root.root owns these
> >>> files; shouldn't it be portage.portage? and /usr/portage
> >>>
> >>> That got me thinking. Everywhere that portage operates or owns
> >>> things, should the ownership not be portage.portage
> >>> and what would the typical permissions be?
> >>
> >> Here, all of /etc/portage is root:root
> >> The tree and all overlays are portage:portage
> >>
> >> You can make a local overlay owned by user you want, stuff you hack away
> >> at yourself should probably be james:james or james:users
> >>
> >> Typically, permissions in /etc/portage are the usual 755 for dirs and
> >> 644 for files
> >>
> >> I set overlays and the tree to be 2775 for dirs and 664 for files
> >>
> >>>
> >>> Is there a master list I can look at? Surely root not own all
> >>> these dirs, like /usr/portage/* ? My /usr/portage is root.root
> >>> and 755 on permissions, is that right?
> >>
> >> Permissions should be what YOU need them to be on your computer. There's
> >> a default, it's what portage makes them when you install stuff
> >>
> >>>
> >>> If so, why?
> >>
> >> Only root should change the master config files in /etc, just like in
> >> all other apps
> >> IIRC emerge can drop privs to a user account, if that user is portage
> >> then portage must own the files
> > 
> > It is true that portage drops privileges to the portage account (unless 
the 
> > ebuild has RESTRICT="userpriv" or I think FEATURES="-userpriv" on 
make.conf) 
> > but it doesn't need to write to the portage tree except to the distfiles 
> > directory so I don't know of any reason to have everything owned by 
> > portage:portage if the perms are 755/644.
> 
> portage also syncs the tree. For that it needs write perms.
> 
> > 
> > Mine is owned by root:root because it got borked one time after a sync so 
I 
> > deleted it and copied from another box manually. The only problem I ever 
had 
> > is that a fetch failed, and I just chowned the distfiles dir to 
portage:portage 
> > to fix it. Only recently it was pointed to me on this list that it was 
supposed 
> > to be portage:portage. I never changed it back to portage:portage but I 
made a 
> > mental note not to forget about it in case of trouble, that way I'll learn 
why 
> > that's the default if/when something breaks :) Besides it offers some 
(limited) 
> > protection against an ebuild accidentally writing to your portage tree.
> > 
> >>>
> >>> In my /usr/local/portage and it's subdirs where I hack on many 
> >>> ebuild, portage.portage owns everything.....?
> >>
> >> Make your life easy, chaown that stuff to james
> > 
> > I personally prefer root:root because I think it is more secure. If you 
let 
> > somebody use your account even for a minute s/he could modify an ebuild 
> > without a password to install whatever s/he wants next time you run an 
update.
> 
> I'll argue that it's less secure. Giving someone else a gap to modify
> your ebuilds when you accidentally leave the computer unlocked is a rare
> event whereas you modifying your own ebuilds like james does is a common
> event.
> 
> If an overlay is root:root then he has to be root every time he works on
> it. If he then commits that rare blunder of leaving the computer
> unlocked, Murphy says he'll do it with a root shell open.

I also have the habit of never opening root shells unless absolutely necessary 
(which is next to never) and when I do I'm very conscious about it so that 
won't be a problem for me. I do a lot of ebuild hacking and that does mean I 
type my password a lot but you get used to it.

> While it is entirely possible to have a rogue colleague install a dodgy
> ebuild, that attacker would have to know exactly what to install where
> and would have to have the ebuild on hand to slip it in during the very
> few minutes available. To my eye that's a very small window of
> opportunity and needs a perfect storm to pull it off = vanishingly small
> risk

If that was my mission I just pick something that I know you run at startup 
like udev (I may pick something more trivial if possible to minimize the 
chance of you noticing). I'd bump the version and have the ebuild install my 
evil program along with it and add a few liner patch to fork() and execve() my 
program or just make my program a patch to the main prog. Then I'll put it on 
a webserver along with a script that does to work for me. Now I just need to 
run a single command to download and execute the script. 

So granted, it takes planning, and maybe some social engineering or other 
methods to get details about your system but once I get the chance it'll take 
only a few seconds and next time you update I'd have root access.

-- 
Fernando Rodriguez


  reply	other threads:[~2015-09-16  7:52 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-09-15 20:09 [gentoo-user] portage directory ownerships? james
2015-09-15 20:23 ` wabenbau
2015-09-15 20:25 ` Alan McKinnon
2015-09-15 22:36   ` Fernando Rodriguez
2015-09-16  2:19     ` [gentoo-user] " james
2015-09-16  6:09       ` Alan McKinnon
2015-09-16  6:01     ` [gentoo-user] " Alan McKinnon
2015-09-16  7:51       ` Fernando Rodriguez [this message]
2015-09-16  7:57   ` Neil Bothwick
2015-09-16 13:46     ` [gentoo-user] " james
2015-09-16 14:19       ` Alan McKinnon
2015-09-16 14:51         ` Neil Bothwick
2015-09-17  5:38           ` Mick

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=BLU436-SMTP5858DBEA300A883B8612188D5B0@phx.gbl \
    --to=frodriguez.developer@outlook.com \
    --cc=gentoo-user@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox