You are not logged in. Login Now
 0-9   9-18         
 
Author Message
10 new of 18 responses total.
tsty
response 9 of 18: Mark Unseen   Dec 13 16:59 UTC 2010

  
re 8 / 6 ... lookis fin in putty.
  
re 2 / 3
  
 "When staff does have to look at private information, the basic
   principle is to look as narrowly as possible."

 which for valisdation p;urposes, and as cross noted HUNDREDS of times, i do.


#3 of 8: by Dan Cross (cross) on Sat, Dec 11, 2010 (08:31):
 I don't think we should be doing that. 


which is exactly why that difference of oopinion is on the next board meeting
agenda.
  
this is not apissing contest.
  
richard
response 10 of 18: Mark Unseen   Dec 19 18:33 UTC 2010

Simply limit root access to one staffer, or two at the most.  Not every
member needs root.  anybody that worried about staff reading their email
wouldn't use email on this kind of board anyway.  Or they'd use
encryption.  Actually couldn't an encryption routine be added, i.e.:

'would you like to encrypt this file? (y/n)'

If yes then the user is prompted to put in a password, the file is
encrypted and the only person who can de-encrypt it is the one who has
the password.  Then even staff couldn't read the files.

cross
response 11 of 18: Mark Unseen   Dec 20 01:26 UTC 2010

You really have no idea at all what your saying means, do you?  "Actually
couldn't an encryption routine be added...."  Really?  Seriously?  Do you have
any idea what you're saying?
veek
response 12 of 18: Mark Unseen   Dec 20 02:40 UTC 2010

resp:10 encryption won't solve the problem. root can always hack your 
key. In root you trust :p
jep
response 13 of 18: Mark Unseen   Dec 20 03:13 UTC 2010

re resp:11: Dan, it's not that bad a suggestion.  It's not practical but
that is not completely obvious.

Richard, encryption of all of a person's data means it would be fully
inaccessible to anyone who didn't know that person's password.  If
someone forgot his password, he couldn't get his data and neither could
anyone else.  Say you tie it to his login password, and he then changed
his login password.  He'd have to keep track of his original password
for all of the data he wanted to access, plus the new password.  Or he'd
have to decrypt and re-encrypt all of his original data.

If he forgets any of his passwords, the data encrypted with it can
*never* be read, by anyone, short of extremely unreasonable efforts.

So what data are we talking about?  The .plan information which is
optionally created, and optionally made public when you first log in? 
What's the point in creating that at all if it's encrypted?  Every file
which he saves?  In his home directory, or in system directories too? 
Conference data which is temporary?  Responses and items?  Does the user
enter a password *every* time he wants to view or change *any* data file?

E-mail?  Outbound mail which is encrypted is un-readable.  Inbound mail?
 *Which* inbound e-mail?  That which enters the system?  Except for the
headers, which are necessary to deliver it?  That which is stored in the
person's mailbox?  You'd have to rewrite the mail system for that?  Mail
stored in the user's home directory?  You'd also have to rewrite *all*
of the mail clients for that.

Keep in mind you're doing all of this in order to satisfy someone who
doesn't trust the roots.  No one else can read most of this data anyway.

re resp:12: No, veek, even root cannot read what your login password is
on a Unix system, let alone any encryption key you come up with on the
fly.  A system admin can see the saved encrypted string in the
/etc/security file, but seeing that is quite a lot different from
knowing the unencrypted string.
nharmon
response 14 of 18: Mark Unseen   Dec 20 04:02 UTC 2010

A system admin could modify sshd to record users' passwords. They could
also read encrypted e-mail by snooping terminal sessions if they went to
the effort of making the necessary modifications.

The point is the only reason for a user to think they have any privacy
on a system is by trusting the system admins to restrain themselves from
violating that privacy.

And without a clear directive from the board on what staff can and can
not look at, and a staff with a reputation of adhering to that
directive, it is impossible for users to have that sort of trust in Grex.
cross
response 15 of 18: Mark Unseen   Dec 20 04:06 UTC 2010

Exactly.
richard
response 16 of 18: Mark Unseen   Dec 20 04:34 UTC 2010

So then say the encryption password has to be inputted via an offsite 
email so that no record of it exists on the system.  There has to be a way 
for users to fully protect the privacy of their files even from root, if 
they are willing to accept the risk of not being able to access the data 
themselves if they lose the pw.  How else can you protect users from 
snooping roots like TS?
nharmon
response 17 of 18: Mark Unseen   Dec 20 07:22 UTC 2010

> There has to be a way for users to fully protect the privacy of their 
> files even from root.

Yeah, copy them to their damn computers.
veek
response 18 of 18: Mark Unseen   Dec 20 08:24 UTC 2010

resp:16 we don't know for sure if TS was snooping. 
--
Richard/Jep, re root and privacy of data, root can read all unencrypted 
data.. this includes decrypt-keys, logins, passwords whatever.

The best solution is to let clueless users know this. Awareness.. i 
mean jeeze! if the two of you didn't know this..

ONLY files encrypted on my home-box and copied to Grex will be 
unreadable by Grex-root so long as I don't ever store/transmit the 
decrypt key on/through Grex. Essentially, you'd be using Grex to store 
encrypted data without processing that data.

resp:13 sure he can and I suggest you use a password for Grex that is 
not used anywhere else (yahoo, bank etc). Storing hashes of passwords 
makes it difficult for a person who hacks into the box from instantly 
grabbing all user passwords. But once the hacker has got root, he could 
load a kernel driver to read passwords from memory as users login via a 
tty. Same thing with encrypted blahblah.. moment you type in a plain 
text decrypt key, root can help himself to that.
 0-9   9-18         
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss