* [gentoo-user] What's with all these "acct-group" ebuilds recently? @ 2020-06-20 4:04 Walter Dnes 2020-06-20 7:50 ` Dale ` (2 more replies) 0 siblings, 3 replies; 24+ messages in thread From: Walter Dnes @ 2020-06-20 4:04 UTC (permalink / raw To: Gentoo Users List Inquiring minds want to know. What exactly do they accomplish, besides cluttering up a database somewhere? -- Walter Dnes <waltdnes@waltdnes.org> I don't run "desktop environments"; I run useful applications ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 4:04 [gentoo-user] What's with all these "acct-group" ebuilds recently? Walter Dnes @ 2020-06-20 7:50 ` Dale 2020-06-20 12:23 ` Sean O'Myers 2020-06-20 15:31 ` Daniel Frey 2 siblings, 0 replies; 24+ messages in thread From: Dale @ 2020-06-20 7:50 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 236 bytes --] Walter Dnes wrote: > Inquiring minds want to know. What exactly do they accomplish, > besides cluttering up a database somewhere? > I found this: https://wiki.gentoo.org/wiki/Categories_acct-group_and_acct-user Dale :-) :-) [-- Attachment #2: Type: text/html, Size: 745 bytes --] ^ permalink raw reply [flat|nested] 24+ messages in thread
* RE: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 4:04 [gentoo-user] What's with all these "acct-group" ebuilds recently? Walter Dnes 2020-06-20 7:50 ` Dale @ 2020-06-20 12:23 ` Sean O'Myers 2020-06-20 15:31 ` Daniel Frey 2 siblings, 0 replies; 24+ messages in thread From: Sean O'Myers @ 2020-06-20 12:23 UTC (permalink / raw To: gentoo-user@lists.gentoo.org [-- Attachment #1: Type: text/plain, Size: 559 bytes --] How do unsubscrip from all Sent from Mail<https://go.microsoft.com/fwlink/?LinkId=550986> for Windows 10 From: Walter Dnes<mailto:waltdnes@waltdnes.org> Sent: Saturday, June 20, 2020 12:05 AM To: Gentoo Users List<mailto:gentoo-user@lists.gentoo.org> Subject: [gentoo-user] What's with all these "acct-group" ebuilds recently? Inquiring minds want to know. What exactly do they accomplish, besides cluttering up a database somewhere? -- Walter Dnes <waltdnes@waltdnes.org> I don't run "desktop environments"; I run useful applications [-- Attachment #2: Type: text/html, Size: 2248 bytes --] ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 4:04 [gentoo-user] What's with all these "acct-group" ebuilds recently? Walter Dnes 2020-06-20 7:50 ` Dale 2020-06-20 12:23 ` Sean O'Myers @ 2020-06-20 15:31 ` Daniel Frey 2020-06-20 18:56 ` Ralph Seichter 2 siblings, 1 reply; 24+ messages in thread From: Daniel Frey @ 2020-06-20 15:31 UTC (permalink / raw To: gentoo-user On 6/19/20 9:04 PM, Walter Dnes wrote: > Inquiring minds want to know. What exactly do they accomplish, > besides cluttering up a database somewhere? > It's not the cluttering of databases that bother me, it's the creation of many ambiguous requests now. I went to emerge mythtv (I think) and now it says it's an ambiguous requests with *both* the group and user of the same name. I must say I'm baffled that a proposal that would create so many ambiguous requests passed... Dan ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 15:31 ` Daniel Frey @ 2020-06-20 18:56 ` Ralph Seichter 2020-06-20 23:06 ` Daniel Frey 0 siblings, 1 reply; 24+ messages in thread From: Ralph Seichter @ 2020-06-20 18:56 UTC (permalink / raw To: gentoo-user * Daniel Frey: > I went to emerge mythtv (I think) and now it says it's an ambiguous > requests with *both* the group and user of the same name. You need to emerge "media-tv/mythtv", not just "mythtv". Nothing ambiguous about it. Further reading: https://www.gentoo.org/glep/glep-0081.html -Ralph ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 18:56 ` Ralph Seichter @ 2020-06-20 23:06 ` Daniel Frey 2020-06-20 23:25 ` Michael Orlitzky ` (2 more replies) 0 siblings, 3 replies; 24+ messages in thread From: Daniel Frey @ 2020-06-20 23:06 UTC (permalink / raw To: gentoo-user On 6/20/20 11:56 AM, Ralph Seichter wrote: > * Daniel Frey: > >> I went to emerge mythtv (I think) and now it says it's an ambiguous >> requests with *both* the group and user of the same name. > > You need to emerge "media-tv/mythtv", not just "mythtv". Nothing > ambiguous about it. > > Further reading: https://www.gentoo.org/glep/glep-0081.html > > -Ralph > You just pointed out the ambiguity. Emerging a package solely by its name worked 99.9% of the time before this change. Now new users get the fun of "Gee, which one is the one I actually want?" MythTV is a fairly clear one to figure out, but other packages aren't. I understand the dependencies problem that they were trying to solve, but I don't think the way it was implemented is a great one. Dan ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 23:06 ` Daniel Frey @ 2020-06-20 23:25 ` Michael Orlitzky 2020-06-21 0:32 ` Paul Colquhoun 2020-06-20 23:36 ` Ralph Seichter 2020-06-21 1:21 ` Rich Freeman 2 siblings, 1 reply; 24+ messages in thread From: Michael Orlitzky @ 2020-06-20 23:25 UTC (permalink / raw To: gentoo-user On 2020-06-20 19:06, Daniel Frey wrote: > > I understand the dependencies problem that they were trying to solve, > but I don't think the way it was implemented is a great one. > This isn't a fundamental problem, it's your package manager being dumb. File a bug; I can think of several band-aids for this, like adding a flag to emerge that makes it prefer non-acct-* packages and then adding that flag to EMERGE_DEFAULT_OPTS. ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 23:25 ` Michael Orlitzky @ 2020-06-21 0:32 ` Paul Colquhoun 0 siblings, 0 replies; 24+ messages in thread From: Paul Colquhoun @ 2020-06-21 0:32 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 837 bytes --] On Sunday, June 21, 2020 9:25:38 A.M. AEST Michael Orlitzky wrote: > On 2020-06-20 19:06, Daniel Frey wrote: > > I understand the dependencies problem that they were trying to solve, > > but I don't think the way it was implemented is a great one. > > This isn't a fundamental problem, it's your package manager being dumb. > File a bug; I can think of several band-aids for this, like adding a > flag to emerge that makes it prefer non-acct-* packages and then adding > that flag to EMERGE_DEFAULT_OPTS. Or do a quick check to see if any of the packages are dependencies of one of the other packages, and prefer the one highest on the ladder. -- Reverend Paul Colquhoun, ULC. http://andor.dropbear.id.au/ Asking for technical help in newsgroups? Read this first: http://catb.org/~esr/faqs/smart-questions.html#intro [-- Attachment #2: Type: text/html, Size: 3939 bytes --] ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 23:06 ` Daniel Frey 2020-06-20 23:25 ` Michael Orlitzky @ 2020-06-20 23:36 ` Ralph Seichter 2020-06-21 1:21 ` Rich Freeman 2 siblings, 0 replies; 24+ messages in thread From: Ralph Seichter @ 2020-06-20 23:36 UTC (permalink / raw To: gentoo-user * Daniel Frey: > You just pointed out the ambiguity. I did no such thing, and there is no ambiguity. There is only the failure to specify a package's identifier ("atom"). > Emerging a package solely by its name worked 99.9% of the time before > this change. Perhaps for the packages you used; I have obviously not verified that. Even if it was the case, it was not guaranteed to work that way. Package atoms are, and have been, of the form CATEGORY/NAME, not just NAME. Emerge also expects atoms, not names (as do package.mask, package.use, etc.). > Now new users get the fun of "Gee, which one is the one I actually > want?" MythTV is a fairly clear one to figure out, but other packages > aren't. "New users" can rely on Gentoo utilities like "eix", "emerge --search" or "equery". There's also https://packages.gentoo.org . Thus, I see no problem. -Ralph ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-20 23:06 ` Daniel Frey 2020-06-20 23:25 ` Michael Orlitzky 2020-06-20 23:36 ` Ralph Seichter @ 2020-06-21 1:21 ` Rich Freeman 2020-06-21 1:40 ` Daniel Frey 2 siblings, 1 reply; 24+ messages in thread From: Rich Freeman @ 2020-06-21 1:21 UTC (permalink / raw To: gentoo-user On Sat, Jun 20, 2020 at 7:06 PM Daniel Frey <djqfrey@gmail.com> wrote: > > You just pointed out the ambiguity. > > Emerging a package solely by its name worked 99.9% of the time before > this change. > > Now new users get the fun of "Gee, which one is the one I actually > want?" MythTV is a fairly clear one to figure out, but other packages > aren't. Honestly, your word of "ambiguity" was somewhat ambiguous. I had no idea what you were talking about in your original post. :) I think this is actually a fair criticism. Not so much that it isn't clear which one to install, but rather that this system does cause you to have to use full cat/pkg atoms when previous pkg alone would have worked. There have always been packages where this is necessary, but this has made this more common. I don't think this was really something anybody thought of at the time - perhaps somebody might have suggested a tweak at the time if it had been. As others have pointed out you could just tweak portage to ignore the account category when expanding incomplete atoms to restore the previous behavior. In any case, as to why this system was devised just read: https://www.gentoo.org/glep/glep-0081.html It hasn't been communicated to users much because it tends to have little impact on them. Before packages just created accounts when needed. Now they pull in an account package that does it instead. If the user doesn't care to manage the uids/gids for various accounts they don't need to worry about how this works. If they do want to manage these themselves they can either create those accounts manually beforehand, or override these packages. It is also much more obvious when a new package is going to create additional accounts, so users who care about such things can intervene before merging the packages. Overall I'd say it is a net improvement. It of course led to a whole bunch of these packages being installed when the change was made, but these would generally be no-ops for existing users. -- Rich ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-21 1:21 ` Rich Freeman @ 2020-06-21 1:40 ` Daniel Frey 2020-06-21 2:04 ` William Kenworthy 0 siblings, 1 reply; 24+ messages in thread From: Daniel Frey @ 2020-06-21 1:40 UTC (permalink / raw To: gentoo-user On 6/20/20 6:21 PM, Rich Freeman wrote: > On Sat, Jun 20, 2020 at 7:06 PM Daniel Frey <djqfrey@gmail.com> wrote: >> >> You just pointed out the ambiguity. >> >> Emerging a package solely by its name worked 99.9% of the time before >> this change. >> >> Now new users get the fun of "Gee, which one is the one I actually >> want?" MythTV is a fairly clear one to figure out, but other packages >> aren't. > > Honestly, your word of "ambiguity" was somewhat ambiguous. I had no > idea what you were talking about in your original post. :) > > I think this is actually a fair criticism. Not so much that it isn't > clear which one to install, but rather that this system does cause you > to have to use full cat/pkg atoms when previous pkg alone would have > worked. There have always been packages where this is necessary, but > this has made this more common. > Yes, I could've worded that better. I would imagine that if someone asks to install something like mythtv or asterisk there's a 0% chance that they want to install a package that creates a user or group, they want the actual package itself. I think that makes more sense. I've been using gentoo since 2003/04? and I've only had to use the cat/package expression maybe twice... and I believe those packages were python or perl related. It's more of a usability issue than anything. The way that it now deals with user and group creation is elegant, especially if you have more than one package that needs a specific user and/or group combination created. When I first saw portage spit out the ambiguity for the request `emerge mythtv` the first thing I thought was "Why would I need to merge a package to create a user? That's the package manager's problem..." :o) Maybe when I have a moment I'll file a bug. Dan ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-21 1:40 ` Daniel Frey @ 2020-06-21 2:04 ` William Kenworthy 2020-06-21 5:05 ` Daniel Frey ` (2 more replies) 0 siblings, 3 replies; 24+ messages in thread From: William Kenworthy @ 2020-06-21 2:04 UTC (permalink / raw To: gentoo-user On 21/6/20 9:40 am, Daniel Frey wrote: > On 6/20/20 6:21 PM, Rich Freeman wrote: >> On Sat, Jun 20, 2020 at 7:06 PM Daniel Frey <djqfrey@gmail.com> wrote: > > Maybe when I have a moment I'll file a bug. > > Dan > Thanks for filing the bug. One of my pet peeves is that the last few years gentoo has been going down the path of spitting everything into smaller and smaller pieces and scattering them around - its fine when things work, but becomes a real pig to fault find and more often ends up in a call for help. I would really like packages to be self contained so its configuration and files are all in one place. I cant see any advantage to having multiple ebuilds for a package instead of using a support framework to deal with it other than exposing multiple opportunities for things to go wrong and make it harder to fix. This not an elegant design! BillK ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-21 2:04 ` William Kenworthy @ 2020-06-21 5:05 ` Daniel Frey 2020-06-21 10:35 ` Rich Freeman 2020-06-26 16:38 ` Daniel Frey 2 siblings, 0 replies; 24+ messages in thread From: Daniel Frey @ 2020-06-21 5:05 UTC (permalink / raw To: gentoo-user On 6/20/20 7:04 PM, William Kenworthy wrote: > > On 21/6/20 9:40 am, Daniel Frey wrote: >> On 6/20/20 6:21 PM, Rich Freeman wrote: >>> On Sat, Jun 20, 2020 at 7:06 PM Daniel Frey <djqfrey@gmail.com> wrote: >> >> Maybe when I have a moment I'll file a bug. >> >> Dan >> > Thanks for filing the bug. One of my pet peeves is that the last few > years gentoo has been going down the path of spitting everything into > smaller and smaller pieces and scattering them around - its fine when > things work, but becomes a real pig to fault find and more often ends up > in a call for help. I would really like packages to be self contained > so its configuration and files are all in one place. I cant see any > advantage to having multiple ebuilds for a package instead of using a > support framework to deal with it other than exposing multiple > opportunities for things to go wrong and make it harder to fix. This not > an elegant design! > > BillK > > > They were trying to solve the problem of having multiple packages dependent on a single user/group - mariadb/mysql comes to mind. By having these types of packages depend on something in the tree they can prevent the condition of having to remove the user/group when another package may still depend on it. It's kind of the opposite to the virtual/* packages I think, or maybe that's the beer talking. Dan ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-21 2:04 ` William Kenworthy 2020-06-21 5:05 ` Daniel Frey @ 2020-06-21 10:35 ` Rich Freeman 2020-06-26 16:38 ` Daniel Frey 2 siblings, 0 replies; 24+ messages in thread From: Rich Freeman @ 2020-06-21 10:35 UTC (permalink / raw To: gentoo-user On Sat, Jun 20, 2020 at 10:04 PM William Kenworthy <billk@iinet.net.au> wrote: > > I cant see any > advantage to having multiple ebuilds for a package instead of using a > support framework to deal with it other than exposing multiple > opportunities for things to go wrong and make it harder to fix. This not > an elegant design! Uh, refactoring shared code into modules is generally considered the best design. Generally packages are split up when they are shared, or when they have different update cycles or upstreams. The details around the splits vary between packages but if you cite and example it probably will be easy to explain why that particular example was split. KDE/Plasma was split up because it makes no sense to rebuild 500 binaries when one of them has a security update. Those account ebuilds were split out because multiple packages could require the same group, and this helps ensure the default uid/gid doesn't change depending on what order you install packages in. Packages like systemd/openrc tend to be a little more modular because they may require integration with other things and it doesn't make sense to replicate that integration across many versions of the packages on both sides. mysql-init-scripts is a separate package because it gets shared between mysql and mariadb. This isn't done often, but it does have the side benefit that if there is a bug in the init.d script you don't have to rebuild the whole database server to get a new bash script. You have virtual packages because sometimes you want to depend on a capability and not a specific package. For example you need an mta to be installed but you don't care which one it is, and so as a result you see virtuals show up in the install list even though they don't do anything. A fair bit of this comes from Gentoo's flexibility. If we didn't support 47 different ways of doing everything it would be much easier to create monolithic packages. In general we tend to find the balance. Plenty of other distros take this MUCH further than Gentoo does - though some of this is driven by being binary. The same source package works for any arch, but if you're doing a binary distro the manpages might work for everybody but obviously anything compiled has to be split up by arch. -- Rich ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-21 2:04 ` William Kenworthy 2020-06-21 5:05 ` Daniel Frey 2020-06-21 10:35 ` Rich Freeman @ 2020-06-26 16:38 ` Daniel Frey 2020-06-26 20:03 ` james 2 siblings, 1 reply; 24+ messages in thread From: Daniel Frey @ 2020-06-26 16:38 UTC (permalink / raw To: gentoo-user On 6/20/20 7:04 PM, William Kenworthy wrote: > Thanks for filing the bug. Gah! I forgot about this! I filed a bug now, I hope I made it clear enough. Others can pipe in there with comments if they like. I did indicate the two potential proposals to correct the issue in the bug itself. https://bugs.gentoo.org/729752 Dan ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-26 16:38 ` Daniel Frey @ 2020-06-26 20:03 ` james 2020-06-26 20:29 ` J. Roeleveld ` (3 more replies) 0 siblings, 4 replies; 24+ messages in thread From: james @ 2020-06-26 20:03 UTC (permalink / raw To: gentoo-user On 6/26/20 12:38 PM, Daniel Frey wrote: > On 6/20/20 7:04 PM, William Kenworthy wrote: >> Thanks for filing the bug. > > Gah! I forgot about this! > > I filed a bug now, I hope I made it clear enough. Others can pipe in > there with comments if they like. > > I did indicate the two potential proposals to correct the issue in the > bug itself. > > https://bugs.gentoo.org/729752 > > Dan BEFORE I contribute to this bug, I'm posting here to see if others are or have interest, in my thoughts on this issue and my related needs for extreme security, via Gentoo. Below is far from complete, but it only provides a very snippets of my (secure) pathway forward with Gentoo. Interesting thread, thanks to all contributors. I'd like to add 'my selfish' interest, as they also be espoused by other, more focused, gentoo users. INTRO: I rarely build gentoo systems, for many reasons, that are not pretty singularly focused. It drastically reduces security, performance and upgrade issues. For me, the days of a any system, having groups or users, are in the history books of very bad ideas. uP are so cheap and less than $100, gets you a very 'bad ass' computer (Rasp. Pi 4+) 16 G map-able ram. Furthermore, SOON, usb_4 devices are going to obsolete the entire concept of a 'hard drive'; hence the death (my prediction) of groups and users on multi-USER systems, albeit slowly. Multi-function, Multi-tasking, and light weight, focused transient clusters are the future. YMMV. So solving a problem, that was real and big, decades ago, fails to look at the future. For me, Gentoo is future proof. I suggest a well documented pathway forward; totally without the concept of groups and users, on a typical, highly secure system. Which is now the baseline for real systems, particularly with a ipv4 or ipv6 static ip, that provide focused and highly restricted functionalities. CA servers are going private, as the public and root CA servers, are suspect, at best, as to being pristinely secure. Yes boys and girls most Certificate Authorities are HACK! Even the main root CAs. The F. Feds are the original culprits, but now it is a feeding frenzy. The planet is now hacked, and groups and users concepts are the past. imho! Danger Will Robinson Danger! So can some of the smarter (gentoo) folks illuminate how to totally avoid groups and users, except for the minimum required, application specific? For example like serial line tools, or outline a set of tweaks/setting to avoid these altogether? I build embedded G. systems. I build single purpose G systems. I build security G. systems (often with the ethernet, in only listen mode. I build G. Firewalls. I build G. highly restricted/filtered servers. NONE of those need users or groups. And if they do, I can obfuscate codes to provide that need, to where filters and focused software gets what it needs to provide functions. Yep, I'm moving to a total 'State_Machine_design' for critical services. Strip out every thing else..... Am I alone, or have/are others contemplating such high secure pathways? I'd be fantastic to find a kernel hacker that is on the pathway of extreme minimization too; private email is fine; if that is in your wheel_house. curiously alone?, James ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-26 20:03 ` james @ 2020-06-26 20:29 ` J. Roeleveld 2020-06-26 20:36 ` Jack ` (2 subsequent siblings) 3 siblings, 0 replies; 24+ messages in thread From: J. Roeleveld @ 2020-06-26 20:29 UTC (permalink / raw To: gentoo-user On 26 June 2020 22:03:35 CEST, james <garftd@verizon.net> wrote: >On 6/26/20 12:38 PM, Daniel Frey wrote: >> On 6/20/20 7:04 PM, William Kenworthy wrote: >>> Thanks for filing the bug. >> >> Gah! I forgot about this! >> >> I filed a bug now, I hope I made it clear enough. Others can pipe in >> there with comments if they like. >> >> I did indicate the two potential proposals to correct the issue in >the >> bug itself. >> >> https://bugs.gentoo.org/729752 >> >> Dan > >BEFORE I contribute to this bug, I'm posting here to see if others are >or have interest, in my thoughts on this issue and my related needs for > >extreme security, via Gentoo. Below is far from complete, but it only >provides a very snippets of my (secure) pathway forward with Gentoo. > >Interesting thread, thanks to all contributors. I'd like to add 'my >selfish' interest, as they also be espoused by other, more focused, >gentoo users. > >INTRO: > >I rarely build gentoo systems, for many reasons, that are not pretty >singularly focused. It drastically reduces security, performance and >upgrade issues. For me, the days of a any system, having groups or >users, are in the history books of very bad ideas. uP are so cheap and >less than $100, gets you a very 'bad ass' computer (Rasp. Pi 4+) 16 G >map-able ram. Furthermore, SOON, usb_4 devices are going to obsolete >the >entire concept of a 'hard drive'; hence the death (my prediction) of >groups and users on multi-USER systems, albeit slowly. > >Multi-function, Multi-tasking, and light weight, focused transient >clusters are the future. YMMV. > > >So solving a problem, that was real and big, decades ago, fails to look > >at the future. For me, Gentoo is future proof. I suggest a well >documented pathway forward; totally without the concept of groups and >users, on a typical, highly secure system. Which is now the baseline >for >real systems, particularly with a ipv4 or ipv6 static ip, that provide >focused and highly restricted functionalities. CA servers are going >private, as the public and root CA servers, are suspect, at best, as to > >being pristinely secure. Yes boys and girls most Certificate >Authorities >are HACK! Even the main root CAs. > >The F. Feds are the original culprits, but now it is a feeding frenzy. >The planet is now hacked, and groups and users concepts are the past. >imho! Danger Will Robinson Danger! > >So can some of the smarter (gentoo) folks illuminate how to totally >avoid groups and users, except for the minimum required, application >specific? For example like serial line tools, or outline a set of >tweaks/setting to avoid these altogether? > >I build embedded G. systems. I build single purpose G systems. I build >security G. systems (often with the ethernet, in only listen mode. I >build G. Firewalls. >I build G. highly restricted/filtered servers. NONE of those need users > >or groups. And if they do, I can obfuscate codes to provide that need, >to where filters and focused software gets what it needs to provide >functions. > >Yep, I'm moving to a total 'State_Machine_design' for critical >services. >Strip out every thing else..... > >Am I alone, or have/are others contemplating such high secure pathways? > >I'd be fantastic to find a kernel hacker that is on the pathway of >extreme minimization too; private email is fine; if that is in your >wheel_house. > > >curiously alone?, >James James, Doesn't this imply that all the software and people interacting with the systems all have root-level access? One of the reasons MS systems were so vulnerable in the past was because they did not support seperated users. It's also still a problem with a lot of legacy systems. As long as more than 1 person can access the system, seperate users and groups/ACLs are necessary. Can you explain how having no users makes a system more secure? -- Joost -- Sent from my Android device with K-9 Mail. Please excuse my brevity. ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-26 20:03 ` james 2020-06-26 20:29 ` J. Roeleveld @ 2020-06-26 20:36 ` Jack 2020-06-27 1:51 ` james 2020-06-26 20:40 ` Rich Freeman 2020-06-26 20:52 ` Michael Orlitzky 3 siblings, 1 reply; 24+ messages in thread From: Jack @ 2020-06-26 20:36 UTC (permalink / raw To: gentoo-user On 2020.06.26 16:03, james wrote: > On 6/26/20 12:38 PM, Daniel Frey wrote: >> On 6/20/20 7:04 PM, William Kenworthy wrote: >>> Thanks for filing the bug. >> >> Gah! I forgot about this! >> >> I filed a bug now, I hope I made it clear enough. Others can pipe in >> there with comments if they like. >> >> I did indicate the two potential proposals to correct the issue in >> the bug itself. >> >> https://bugs.gentoo.org/729752 >> >> Dan > > BEFORE I contribute to this bug, I'm posting here to see if others > are or have interest, in my thoughts on this issue and my related > needs for extreme security, via Gentoo. Below is far from complete, > but it only provides a very snippets of my (secure) pathway forward > with Gentoo. > > Interesting thread, thanks to all contributors. I'd like to add 'my > selfish' interest, as they also be espoused by other, more focused, > gentoo users. > > INTRO: > > I rarely build gentoo systems, for many reasons, that are not pretty > singularly focused. It drastically reduces security, performance and > upgrade issues. For me, the days of a any system, having groups or > users, are in the history books of very bad ideas. uP are so cheap > and less than $100, gets you a very 'bad ass' computer (Rasp. Pi 4+) > 16 G map-able ram. Furthermore, SOON, usb_4 devices are going to > obsolete the entire concept of a 'hard drive'; hence the death (my > prediction) of groups and users on multi-USER systems, albeit slowly. > > Multi-function, Multi-tasking, and light weight, focused transient > clusters are the future. YMMV. > > > So solving a problem, that was real and big, decades ago, fails to > look at the future. For me, Gentoo is future proof. I suggest a well > documented pathway forward; totally without the concept of groups and > users, on a typical, highly secure system. Which is now the baseline > for real systems, particularly with a ipv4 or ipv6 static ip, that > provide focused and highly restricted functionalities. CA servers are > going private, as the public and root CA servers, are suspect, at > best, as to being pristinely secure. Yes boys and girls most > Certificate Authorities are HACK! Even the main root CAs. > > The F. Feds are the original culprits, but now it is a feeding > frenzy. The planet is now hacked, and groups and users concepts are > the past. imho! Danger Will Robinson Danger! > > So can some of the smarter (gentoo) folks illuminate how to totally > avoid groups and users, except for the minimum required, application > specific? For example like serial line tools, or outline a set of > tweaks/setting to avoid these altogether? > > I build embedded G. systems. I build single purpose G systems. I > build security G. systems (often with the ethernet, in only listen > mode. I build G. Firewalls. > I build G. highly restricted/filtered servers. NONE of those need > users or groups. And if they do, I can obfuscate codes to provide > that need, to where filters and focused software gets what it needs > to provide functions. > > Yep, I'm moving to a total 'State_Machine_design' for critical > services. Strip out every thing else..... > > Am I alone, or have/are others contemplating such high secure > pathways? I'd be fantastic to find a kernel hacker that is on the > pathway of extreme minimization too; private email is fine; if that > is in your wheel_house. > > > curiously alone?, > James While you may not be alone, I do believe you're in a rather small group. There are probably more who are interested in watching it progress than who can actually participate and contribute. And while what you propose may well be part of the future, and it may even be a large part of it, it won't be so anywhere near soon enough to avoid the need to continue to improve current systems, even if the improvements are only usability related, and not directly related to security. This current issue is nothing more than an annoyance, but it's a major annoyance for many Gentoo users, possibly more-so for the more casual users. (Is "casual Gentoo user" an oxymoron?) As the bug proposes, there are ways of solving it without decreasing security. Jack ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-26 20:36 ` Jack @ 2020-06-27 1:51 ` james 0 siblings, 0 replies; 24+ messages in thread From: james @ 2020-06-27 1:51 UTC (permalink / raw To: gentoo-user On 6/26/20 4:36 PM, Jack wrote: > On 2020.06.26 16:03, james wrote: >> On 6/26/20 12:38 PM, Daniel Frey wrote: >>> On 6/20/20 7:04 PM, William Kenworthy wrote: >>>> Thanks for filing the bug. >>> >>> Gah! I forgot about this! >>> >>> I filed a bug now, I hope I made it clear enough. Others can pipe in >>> there with comments if they like. >>> >>> I did indicate the two potential proposals to correct the issue in >>> the bug itself. >>> >>> https://bugs.gentoo.org/729752 >>> >>> Dan >> >> BEFORE I contribute to this bug, I'm posting here to see if others are >> or have interest, in my thoughts on this issue and my related needs >> for extreme security, via Gentoo. Below is far from complete, but it >> only provides a very snippets of my (secure) pathway forward with Gentoo. >> >> Interesting thread, thanks to all contributors. I'd like to add 'my >> selfish' interest, as they also be espoused by other, more focused, >> gentoo users. >> >> INTRO: >> >> I rarely build gentoo systems, for many reasons, that are not pretty >> singularly focused. It drastically reduces security, performance and >> upgrade issues. For me, the days of a any system, having groups or >> users, are in the history books of very bad ideas. uP are so cheap and >> less than $100, gets you a very 'bad ass' computer (Rasp. Pi 4+) 16 G >> map-able ram. Furthermore, SOON, usb_4 devices are going to obsolete >> the entire concept of a 'hard drive'; hence the death (my prediction) >> of groups and users on multi-USER systems, albeit slowly. >> >> Multi-function, Multi-tasking, and light weight, focused transient >> clusters are the future. YMMV. >> >> >> So solving a problem, that was real and big, decades ago, fails to >> look at the future. For me, Gentoo is future proof. I suggest a well >> documented pathway forward; totally without the concept of groups and >> users, on a typical, highly secure system. Which is now the baseline >> for real systems, particularly with a ipv4 or ipv6 static ip, that >> provide focused and highly restricted functionalities. CA servers are >> going private, as the public and root CA servers, are suspect, at >> best, as to being pristinely secure. Yes boys and girls most >> Certificate Authorities are HACK! Even the main root CAs. >> >> The F. Feds are the original culprits, but now it is a feeding frenzy. >> The planet is now hacked, and groups and users concepts are the past. >> imho! Danger Will Robinson Danger! >> >> So can some of the smarter (gentoo) folks illuminate how to totally >> avoid groups and users, except for the minimum required, application >> specific? For example like serial line tools, or outline a set of >> tweaks/setting to avoid these altogether? >> >> I build embedded G. systems. I build single purpose G systems. I build >> security G. systems (often with the ethernet, in only listen mode. I >> build G. Firewalls. >> I build G. highly restricted/filtered servers. NONE of those need >> users or groups. And if they do, I can obfuscate codes to provide that >> need, to where filters and focused software gets what it needs to >> provide functions. >> >> Yep, I'm moving to a total 'State_Machine_design' for critical >> services. Strip out every thing else..... >> >> Am I alone, or have/are others contemplating such high secure >> pathways? I'd be fantastic to find a kernel hacker that is on the >> pathway of extreme minimization too; private email is fine; if that is >> in your wheel_house. >> >> >> curiously alone?, >> James > While you may not be alone, I do believe you're in a rather small > group.? There are probably more who are interested in watching it > progress than who can actually participate and contribute.? And while > what you propose may well be part of the future, and it may even be a > large part of it, it won't be so anywhere near soon enough to avoid the > need to continue to improve current systems, even if the improvements > are only usability related, and not directly related to security. Yep, Yep Yep. Um, now covid hit. We've been promised much more from the next 'virus'. Massive security problems, for all OSes, dispersed computational issues and such. So, a vision (dream?) of total self sufficiency, with packets of really secure content traversing the fibers of the world, and a few smart, empower techies running a given hub, sure we can solve the security issues. However, the big webs are mere wide spots on the highway and should readily be "dynamically" replaceable; never critically necessary for any astute user. And the F. Feds and their overseas counterpart? Are left behind in the dust, for good. I think you'll see a US presidential candidate, whom constitutionally, recognzes the US citizens have a fundamental (God given?) right to superior security, as long as they have a very clean legal record. Boy that's a twist: well behave citizens get superior security righs to F. Feds? Boy, that's going to be a popular idea, methinks. Actually, there are many Christian lawyers, who know of ancient documents and USA historical documents and letters that expound on those documents, where this is well established. NO questions atm. Let folks do their own research. We'll get there sooner than you expect...... Bank on it! WE have to, otherwise the US banking system is DOA. > This > current issue is nothing more than an annoyance, but it's a major > annoyance for many Gentoo users, possibly more-so for the more casual > users.? (Is "casual Gentoo user" an oxymoron?)? As the bug proposes, > there are ways of solving it without decreasing security. > Jack Jack, Jack, Jack. VIVA LA REVELUTION! and you started it all? The USA is currently the longest standing government. The stench of what "our" legal system has become, well it's insufferable even by many of the brilliant legal minds whom have pretty much had enough of the big corporations running destructively, over what rights the founders of this great nation intended. Lawyers, above the law? That needs to be fixed, yesterday. WE, the folks in good standing, have rights that supersede the legal morass of what the judiciary and executive branch have done by giving our rights away to the Corporations. Be long, Be strong, but most importantly, Be for the benefit of equality of all. Rights to privacy are fundamental rights and I'd remind everyone that many have died for OUR RIGHTS. hth, James ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-26 20:03 ` james 2020-06-26 20:29 ` J. Roeleveld 2020-06-26 20:36 ` Jack @ 2020-06-26 20:40 ` Rich Freeman 2020-06-27 2:18 ` james 2020-06-26 20:52 ` Michael Orlitzky 3 siblings, 1 reply; 24+ messages in thread From: Rich Freeman @ 2020-06-26 20:40 UTC (permalink / raw To: gentoo-user On Fri, Jun 26, 2020 at 4:03 PM james <garftd@verizon.net> wrote: > > So can some of the smarter (gentoo) folks illuminate how to totally > avoid groups and users, except for the minimum required, application > specific? For example like serial line tools, or outline a set of > tweaks/setting to avoid these altogether? > IMO if extra security is your goal then if anything you want to have MORE use of users rather than less. Everything should be least privilege, and usually that means having separate UIDs for everything, and then layering on stuff like namespaces/SELinux/capabilities/etc on top of that to further tailor things. Of course the more config you have like this, the more there is to audit. However, you also have to consider the failure mode. When you have layers of security and some layer fails, chances are that the failure still results in more containment than what you would have had if you didn't build the layers in the first place. Now, one thing that would result in fewer UIDs is installing less stuff. Maybe that is what you're getting at, and of course reducing the attack surface is a good thing. However, keep in mind that a UID in /etc/passwd doesn't actually do anything if no process runs with that UID - it is just a line in a text file. So, having a uucp group when no processes have access to it doesn't really cause issues. Removing the group doesn't actually make things more secure, because processes can use a gid even if it doesn't exist in /etc/groups. Effectively any POSIX system has every uid/gid available even if there is no /etc/passwd at all. -- Rich ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-26 20:40 ` Rich Freeman @ 2020-06-27 2:18 ` james 2020-06-27 10:43 ` Rich Freeman 0 siblings, 1 reply; 24+ messages in thread From: james @ 2020-06-27 2:18 UTC (permalink / raw To: gentoo-user On 6/26/20 4:40 PM, Rich Freeman wrote: > On Fri, Jun 26, 2020 at 4:03 PM james <garftd@verizon.net> wrote: >> >> So can some of the smarter (gentoo) folks illuminate how to totally >> avoid groups and users, except for the minimum required, application >> specific? For example like serial line tools, or outline a set of >> tweaks/setting to avoid these altogether? >> > > IMO if extra security is your goal then if anything you want to have > MORE use of users rather than less. Everything should be least > privilege, and usually that means having separate UIDs for everything, > and then layering on stuff like namespaces/SELinux/capabilities/etc on > top of that to further tailor things. OK, that's a pathway forward, that I no longer believe in, though viable. I think the days of systems design and implementation, that require a default, multi-user, scenario, are arcane and subject to many attack vectors. Granted many will and do disagree, and new pathways are rarely well lighted in my experiences. > Of course the more config you have like this, the more there is to > audit. However, you also have to consider the failure mode. When you > have layers of security and some layer fails, chances are that the > failure still results in more containment than what you would have had > if you didn't build the layers in the first place. Security Schema are many and all are under attack. Most of what I need from a 'well behaved' collective of microprocessors and microcontrollers are in-house and need little (data) from the outside. The need to share outside is nice, but can be limited, dynamically for a wide variety of reason. The deep desire to share, in part-and-parcel, is to be human. For me, as a christian, its far deeper of a need, but that on me. Quick and automated shut-off, is a concept I like very, very much. Currently, the need to be able to "snap my fingers" and instantly isolate, is mostly prevented because our USA government forces chip manufacturers to put "bullshit and backdoors" into most all processors and controllers. That shit has to STOP. They, including our F. Feds do not have that right. If we do not fix this, SATAN gets control; hence the end-times are upon us, like a thief in the night. That's my belief and I know many that think it is too late, to fix. the first step is to have 100% of critical systems components manufactured in the USA. Each country can and should do their own thing. Leaders have now realized, letting folks that rule the large corporations, "have it their way" has landed up in a pile of problems. > Now, one thing that would result in fewer UIDs is installing less > stuff. Maybe that is what you're getting at, and of course reducing > the attack surface is a good thing. However, keep in mind that a UID > in /etc/passwd doesn't actually do anything if no process runs with > that UID - it is just a line in a text file. So, having a uucp group > when no processes have access to it doesn't really cause issues. unless the remotes can inject into that causal hardware relationship and exploit it? Who knows what lurks in them micro-codes of silicon these days.... much of the hardware has hidden Rf channels, well hidden and it requires quite expensive systems that the semiconductor companies provide, mostly to governments, on a use-to-be limited basis. That's why the USA is forcing AMD to bring 7-nm manufacturing to US soil, so they are under USA rule-sets. Makes the Mafia look like choir boys...... here's one publicized: https://www.zdnet.com/article/minix-intels-hidden-in-chip-operating-system/ and a bit deeper: https://freetechsforum.com/minix-%E2%80%8Bintels-hidden-chip-operating-system/ > Removing the group doesn't actually make things more secure, because > processes can use a gid even if it doesn't exist in /etc/groups. > Effectively any POSIX system has every uid/gid available even if there > is no /etc/passwd at all. And that is coded into the parts of the kernel, we cannot eliminate? Typical sploits? Curiously, a bit deeper explanation? I'm no expert at this stuff, but I am very interested to hear more, from your perspective and experiences which you are comfortable sharing. James ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-27 2:18 ` james @ 2020-06-27 10:43 ` Rich Freeman 2020-06-27 19:22 ` Sid Spry 0 siblings, 1 reply; 24+ messages in thread From: Rich Freeman @ 2020-06-27 10:43 UTC (permalink / raw To: gentoo-user On Fri, Jun 26, 2020 at 10:18 PM james <garftd@verizon.net> wrote: > > On 6/26/20 4:40 PM, Rich Freeman wrote: > > Removing the group doesn't actually make things more secure, because > > processes can use a gid even if it doesn't exist in /etc/groups. > > Effectively any POSIX system has every uid/gid available even if there > > is no /etc/passwd at all. > > And that is coded into the parts of the kernel, we cannot eliminate? > Typical sploits? > > Curiously, a bit deeper explanation? So, ultimately a uid/gid is just a number, and a field in a couple of tables. Inodes have them, and processes have them. There might be other things that have them that I'm not thinking of, but those are probably the main two. If a process wants to send signals to another process the uids have to match, or it must have a capability to break this rule. If a process wants to read a file, the uid/gid/permissions/ACLs/etc must correspond appropriately. I'm sure there are a bunch of other system calls where uids/gids matter as well. The field that stores the IDs has a certain size, and thus any number within the expressible range is valid. You can't "get rid" of a UID any more than you can ban the number 13. However, since the logic is based on matching it really doesn't matter much - if you launch a process with a UID you intended to be "unused" it basically is completely isolated as far as the filesystem and other processes go since its UID doesn't match anything else (it could still touch world read/writeable files, but that is true if it ran under a UID you preferred that it use). The files /etc/passwd and /etc/group are used by various system programs to map these IDs to human-readable names, but they really aren't part of how the kernel works. Just about any command that can take a username can take a user ID, and if you want to really drive people crazy go ahead and try using numeric usernames (I believe the IDs take precedence in command lines). So, if you deleted /etc/{passwd,group,shadow} you could still have a "perfectly working" linux userspace, but commands like login wouldn't work as those use usernames and of course there would be no mapping to passwords. However init would still run as uid 0, and it could launch processes with other uids, and those processes would have regular filesystem behavior. It wouldn't be POSIX and various things might break, but you could have a name-less userspace just fine on linux. The kernel itself never looks at /etc/shadow and so on - it just sees numeric IDs. Android is an example of an OS that makes some substantial changes in userspace to how things like UIDs are traditionally used (that, and the OOM killer). Most things associated with users/groups in linux are conventions implemented in userspace. But, as I said, using more uids/gids in general means having more separation. In general it only increases security, with the caveat that it does potentially make auditing more complex. -- Rich ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-27 10:43 ` Rich Freeman @ 2020-06-27 19:22 ` Sid Spry 0 siblings, 0 replies; 24+ messages in thread From: Sid Spry @ 2020-06-27 19:22 UTC (permalink / raw To: gentoo-user On Sat, Jun 27, 2020, at 5:43 AM, Rich Freeman wrote: > But, as I said, using more uids/gids in general means having more > separation. In general it only increases security, with the caveat > that it does potentially make auditing more complex. > Android's security model is uid per app. This is about as effective you can get on a mostly stock kernel. There is essentially no isolation within a uid. It's also why it is very hard to use an Android phone for anything without rooting it. If you look at the CVEs for Android they are typically rather benign, the more persistent issue is you constantly carry the device with you. ^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [gentoo-user] What's with all these "acct-group" ebuilds recently? 2020-06-26 20:03 ` james ` (2 preceding siblings ...) 2020-06-26 20:40 ` Rich Freeman @ 2020-06-26 20:52 ` Michael Orlitzky 3 siblings, 0 replies; 24+ messages in thread From: Michael Orlitzky @ 2020-06-26 20:52 UTC (permalink / raw To: gentoo-user On 2020-06-26 16:03, james wrote: > > BEFORE I contribute to this bug, The bug is already fixed in a newer version of portage =) ^ permalink raw reply [flat|nested] 24+ messages in thread
end of thread, other threads:[~2020-06-27 19:22 UTC | newest] Thread overview: 24+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2020-06-20 4:04 [gentoo-user] What's with all these "acct-group" ebuilds recently? Walter Dnes 2020-06-20 7:50 ` Dale 2020-06-20 12:23 ` Sean O'Myers 2020-06-20 15:31 ` Daniel Frey 2020-06-20 18:56 ` Ralph Seichter 2020-06-20 23:06 ` Daniel Frey 2020-06-20 23:25 ` Michael Orlitzky 2020-06-21 0:32 ` Paul Colquhoun 2020-06-20 23:36 ` Ralph Seichter 2020-06-21 1:21 ` Rich Freeman 2020-06-21 1:40 ` Daniel Frey 2020-06-21 2:04 ` William Kenworthy 2020-06-21 5:05 ` Daniel Frey 2020-06-21 10:35 ` Rich Freeman 2020-06-26 16:38 ` Daniel Frey 2020-06-26 20:03 ` james 2020-06-26 20:29 ` J. Roeleveld 2020-06-26 20:36 ` Jack 2020-06-27 1:51 ` james 2020-06-26 20:40 ` Rich Freeman 2020-06-27 2:18 ` james 2020-06-27 10:43 ` Rich Freeman 2020-06-27 19:22 ` Sid Spry 2020-06-26 20:52 ` Michael Orlitzky
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox