RE: Installation of software, and security. . .
I think you are wrong. Suppose you do create that (mythical) complete set
of actions inside the package manager.
You can't add security - by definition if you run an rpm-type install you
are root, so there's nothing new.
You can't use something like SELinux unless you split the package in two (a
god-equivalent version to add the permissions for the install to the SElinux
databases and then a non-root install using those permissions). So instead
of hacking into the install, just hack into the god-equiv part).
All you've done for yourself is to create another (mini) 'language' the
packager has to learn, instead of using good ole
(insert-name-of-shell-here).
Where there could be gains are in a small number of those 'hard to do right'
actions, which are usually erroneously scripted. But as it is, many RPMs
(and I'm guilty here), don't use what IS available. So adding more things
won't really help that much either.
Fixing package scripts to take advantage of your new, wonderful actions
would be a massive task, across 1000s of packages (and egos) to fix.
So if there's nothing gained, well, why bother?
However, there is somewhere you can affect things - and that is within rpm
itself. How: enable/force better logging of the actions performed during a
script. Down to the line-of-a-script level if you want. That would be
effective/useful, even if nobody ever fixed up a script.
-----Burton
-----Original Message-----
From: Tim Nelson [mailto:tim.nelson@xxxxxxxxxxxx]
Sent: Monday, July 18, 2005 11:01 PM
To: John Richard Moser
Cc: Klaus Schwenk; bugtraq@xxxxxxxxxxxxxxxxx
Subject: Re: Installation of software, and security. . .
On Sun, 17 Jul 2005, John Richard Moser wrote:
>> like a complete mess. Far too many programs wouldn't need an
>> installation in the first place. And it's hard to give end users a
>> rule of thumb on how to handle installation programs when there is no
>> real agreement on what installers should
>> (not) do. At least from my POV.
>>
>
> Yes, you hit the nail on the head with a jackhammer. One discussion
> on autopackage was that the devs don't want to limit the API and thus
> want the prepare, install, and uninstall to be a bash script supplied
> by the package "so it can do anything." I hate this logic. Why does
> it need to be able to do "anything"?
I think you're both right :). I agree that packages need to be able
to do anything, but it'd be nice if we could try to eliminate the pre and
post install scripts.
One thing that would be useful is if someone could look at the
things that are typically done in pre/post install scripts, and then
integrate those into the package manager. We have a set of custom RPMs
here, and they do a variety of things in the pre and post install scripts,
but the main ones are:
- Reconfigure other software; apache never needs this, because it
uses the conf.d directory, but the tomcat we use doesn't seem to
work this way, and it should
- Service reloads; after we add a file which does the apache config,
we need to reload apache; if RPM supported us going
"%reload apache", then we wouldn't need the post-install script
for that
My suggested solution would be to:
1. Build in to RPM (or whatever) any relatively harmless features
which are regularly used (eg. reload)
2. Issue a security warning and quit for any packages that have
pre/post install scripts, and any actions that might cause trouble
(eg. reload)
3. Set --with-scripts (or something) to enable running scripts, and
--with-actions to enable potentially troublesome actions (eg.
reload), or --without-actions to just install files and not do the
actions.
?
:)
--
Kind Regards,
Tim Nelson
Server Administrator
P: 03 9934 0888
F: 03 9934 0899
E: tim.nelson@xxxxxxxxxxxx
W: www.webalive.biz
WebAlive Technologies
Level 1, Innovation Building
Digital Harbour
1010 La Trobe Street
Docklands Melbourne VIC 3008
This email (including all attachments) is intended solely for the named
addressee. It is confidential and may contain legally privileged
information. If you receive it in error, please let us know by reply email,
delete it from your system and destroy any copies. This email is also
subject to copyright. No part of it should be reproduced, adapted or
transmitted without the written consent of the copyright owner.
Emails may be interfered with, may contain computer viruses or other defects
and may not be successfully replicated on other systems. We give no
warranties in relation to these matters. If you have any doubts about the
authenticity of an email purportedly sent by us, please contact us
immediately.