From owner-freebsd-gnome@FreeBSD.ORG Sat Apr 12 16:44:19 2008 Return-Path: Delivered-To: gnome@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 078011065670 for ; Sat, 12 Apr 2008 16:44:19 +0000 (UTC) (envelope-from cokane@freebsd.org) Received: from QMTA05.westchester.pa.mail.comcast.net (qmta05.westchester.pa.mail.comcast.net [76.96.62.48]) by mx1.freebsd.org (Postfix) with ESMTP id 868F88FC21 for ; Sat, 12 Apr 2008 16:44:18 +0000 (UTC) (envelope-from cokane@freebsd.org) Received: from OMTA03.westchester.pa.mail.comcast.net ([76.96.62.27]) by QMTA05.westchester.pa.mail.comcast.net with comcast id CcSe1Z0060bG4ec550Kf00; Sat, 12 Apr 2008 16:42:34 +0000 Received: from discordia ([24.60.135.75]) by OMTA03.westchester.pa.mail.comcast.net with comcast id CgkH1Z0071dmTCQ3P00000; Sat, 12 Apr 2008 16:44:17 +0000 X-Authority-Analysis: v=1.0 c=1 a=aiIX5UjjAAAA:8 a=H1EZV_8NmEOvym2NjNsA:9 a=xBop-aMKyTMBbiC3mE8A:7 a=zFNyQd5NiiMeWOMcw17RxcYIFPoA:4 a=LY0hPdMaydYA:10 a=S-hrGqSUTLgMLF7ebJUA:9 a=IlkBDjNHWS-K148heJAA:7 a=a8MAdqxgm6O2M7yUgvnfm8au3RYA:4 a=NfA2RSpTaHsA:10 a=SgSAN2HJMHDFlCVxbb0A:9 a=U-HBXVsfLHx5EiwPWIK2o5mER7cA:4 a=rPt6xJ-oxjAA:10 Received: by discordia (Postfix, from userid 103) id 8963A1636F9; Sat, 12 Apr 2008 12:44:17 -0400 (EDT) X-Spam-Checker-Version: SpamAssassin 3.1.8-gr1 (2007-02-13) on discordia X-Spam-Level: X-Spam-Status: No, score=-4.3 required=5.0 tests=ALL_TRUSTED,AWL,BAYES_00, MIME_BASE64_NO_NAME autolearn=ham version=3.1.8-gr1 Received: from [172.20.1.3] (erwin.int.cokane.org [172.20.1.3]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by discordia (Postfix) with ESMTP id DC8591636F8; Sat, 12 Apr 2008 12:43:59 -0400 (EDT) From: Coleman Kane To: Joe Marcus Clarke In-Reply-To: <1207929297.55415.13.camel@shumai.marcuscom.com> References: <47FD09AC.2020907@FreeBSD.org> <1207776230.61729.28.camel@shumai.marcuscom.com> <47FD34E8.2000005@FreeBSD.org> <1207872846.87478.38.camel@shumai.marcuscom.com> <47FF66E3.8000304@FreeBSD.org> <47FF722B.109@FreeBSD.org> <1207929297.55415.13.camel@shumai.marcuscom.com> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="=-QU9gGQmVx5cG5PtPBIoB" Organization: FreeBSD Project Date: Sat, 12 Apr 2008 12:43:46 -0400 Message-Id: <1208018626.10093.7.camel@localhost> Mime-Version: 1.0 X-Mailer: Evolution 2.22.1 FreeBSD GNOME Team Port Cc: gnome@freebsd.org, imp@freebsd.org Subject: Re: Seahorse issues X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 12 Apr 2008 16:44:19 -0000 --=-QU9gGQmVx5cG5PtPBIoB Content-Type: multipart/mixed; boundary="=-4lgvQw6sVZ+aCW4h2MeR" --=-4lgvQw6sVZ+aCW4h2MeR Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Fri, 2008-04-11 at 11:54 -0400, Joe Marcus Clarke wrote: > On Fri, 2008-04-11 at 10:14 -0400, Coleman Kane wrote: > > I removed your earleir patch, which has the side effect of causing=20 > > gnome_keyring_memory_try_alloc(size) to act in a manner that violates=20 > > its documentation, as well as causing the above bug. I then added the=20 > > three patches to security/seahorse which I posted into=20 > > http://bugzilla.gnome.org/show_bug.cgi?id=3D527193 today: > > * http://bugzilla.gnome.org/attachment.cgi?id=3D109055 > > * http://bugzilla.gnome.org/attachment.cgi?id=3D109056 > > * http://bugzilla.gnome.org/attachment.cgi?id=3D109057 > >=20 > > These three alter the behavior of Seahorse in the manner I described=20 > > above, and don't touch gnome-keyring. For all purposes, I *think*=20 > > gnome-keyring is acting properly here. The consumer of gnome-keyring=20 >=20 > You're right. I was hoping to hack g-k in such a way to avoid having to > fix other broken consumers in the future. Of course, my approach was > very wrong. >=20 > > (seahorse) should first be testing if the features that it wants to use= =20 > > are actually provided by the library before it blindingly attempts to=20 > > use them. This is, IMHO, why gnome-keyring provides the *_try(...)=20 > > versions of its securemem alloc functions. >=20 > Fixing seahorse is the right thing to do. The bug has been moved into > gnome-keyring's court, so you way want to get them to move it back. >=20 > >=20 > > Additionally, you'll get a seahorse g_warning about unavailable secure=20 > > memory now too. >=20 > Thanks for your work here. Feel free to commit these patches to our > seahorse port. >=20 > Joe >=20 Joe, I've got a revised version of the patch that allows the seahorse panel applet to work properly, as well as all of the other seahorse-based gadgetry that is installed with the security/seahorse port. This performs the conditional alloc remappings inside of seahorse-secure-memory.c, and warns the user appropriately when they don't have mlock() privileges. I'm attaching the full patch to security/seahorse here for you to look over. I'll submit a forward of this email to ports@ as well (so that we don't incur the wrath of cross-post-thulu). If it doesn't break anything, and seems to make this thing work for everyone, then I'll commit it later on (probably tomorrow or Monday). I'd like to give it time to simmer, in case there are more things touched by this problem that might come up. As for the mlock() privilege issue, I am not sure what we'll do about that. It would be nice, at some point, to support that feature for normal users. As long as I'm diligent about my swap-space, etc... and access to my workstation, I'm *pretty* secure. Things like common-use lab computers, etc... are probably more appropriate for this feature. -- Coleman Kane --=-4lgvQw6sVZ+aCW4h2MeR Content-Description: security_seahorse-no-mlock.patch Content-Disposition: inline; filename=security_seahorse-no-mlock.patch Content-Transfer-Encoding: base64 Content-Type: text/x-patch; charset=UTF-8 ZGlmZiAtLWdpdCBhL3NlY3VyaXR5L3NlYWhvcnNlL01ha2VmaWxlIGIvc2VjdXJpdHkvc2VhaG9y c2UvTWFrZWZpbGUNCmluZGV4IGEwNjVhMDkuLmQ1ZDQxN2YgMTAwNjQ0DQotLS0gYS9zZWN1cml0 eS9zZWFob3JzZS9NYWtlZmlsZQ0KKysrIGIvc2VjdXJpdHkvc2VhaG9yc2UvTWFrZWZpbGUNCkBA IC04LDYgKzgsNyBAQA0KIA0KIFBPUlROQU1FPQlzZWFob3JzZQ0KIFBPUlRWRVJTSU9OPQkyLjIy LjENCitQT1JUUkVWSVNJT049CTENCiBDQVRFR09SSUVTPQlzZWN1cml0eSBnbm9tZQ0KIE1BU1RF Ul9TSVRFUz0JR05PTUUNCiBESVNUX1NVQkRJUj0JZ25vbWUyDQpkaWZmIC0tZ2l0IGEvc2VjdXJp dHkvc2VhaG9yc2UvZmlsZXMvcGF0Y2gtbGlic2VhaG9yc2Vfc2VhaG9yc2Utc2VjdXJlLW1lbW9y eS5jIGIvc2VjdXJpdHkvc2VhaG9yc2UvZmlsZXMvcGF0Y2gtbGlic2VhaG9yc2Vfc2VhaG9yc2Ut c2VjdXJlLW1lbW9yeS5jDQpuZXcgZmlsZSBtb2RlIDEwMDY0NA0KaW5kZXggMDAwMDAwMC4uNGE2 MzAwYg0KLS0tIC9kZXYvbnVsbA0KKysrIGIvc2VjdXJpdHkvc2VhaG9yc2UvZmlsZXMvcGF0Y2gt bGlic2VhaG9yc2Vfc2VhaG9yc2Utc2VjdXJlLW1lbW9yeS5jDQpAQCAtMCwwICsxLDQyIEBADQor LS0tIGxpYnNlYWhvcnNlL3NlYWhvcnNlLXNlY3VyZS1tZW1vcnkuYy5vcmlnCTIwMDgtMDQtMTIg MTI6MDk6NTguMDAwMDAwMDAwIC0wNDAwDQorKysrIGxpYnNlYWhvcnNlL3NlYWhvcnNlLXNlY3Vy ZS1tZW1vcnkuYwkyMDA4LTA0LTEyIDEyOjEwOjA1LjAwMDAwMDAwMCAtMDQwMA0KK0BAIC05Nywx MyArOTcsMzEgQEANCisgdm9pZA0KKyBzZWFob3JzZV9zZWN1cmVfbWVtb3J5X2luaXQgKCkNCisg ew0KKy0gICAgR01lbVZUYWJsZSB2dGFibGU7DQorLSAgICANCistICAgIG1lbXNldCAoJnZ0YWJs ZSwgMCwgc2l6ZW9mICh2dGFibGUpKTsNCistICAgIHZ0YWJsZS5tYWxsb2MgPSBzd2l0Y2hfbWFs bG9jOw0KKy0gICAgdnRhYmxlLnJlYWxsb2MgPSBzd2l0Y2hfcmVhbGxvYzsNCistICAgIHZ0YWJs ZS5mcmVlID0gc3dpdGNoX2ZyZWU7DQorLSAgICB2dGFibGUuY2FsbG9jID0gc3dpdGNoX2NhbGxv YzsNCistICAgIGdfbWVtX3NldF92dGFibGUgKCZ2dGFibGUpOw0KKysgICAgaWYgKHNlYWhvcnNl X3RyeV9na19zZWN1cmVfbWVtb3J5KCkgPT0gVFJVRSkgew0KKysgICAgICAgIEdNZW1WVGFibGUg dnRhYmxlOw0KKysNCisrICAgICAgICBtZW1zZXQgKCZ2dGFibGUsIDAsIHNpemVvZiAodnRhYmxl KSk7DQorKyAgICAgICAgdnRhYmxlLm1hbGxvYyA9IHN3aXRjaF9tYWxsb2M7DQorKyAgICAgICAg dnRhYmxlLnJlYWxsb2MgPSBzd2l0Y2hfcmVhbGxvYzsNCisrICAgICAgICB2dGFibGUuZnJlZSA9 IHN3aXRjaF9mcmVlOw0KKysgICAgICAgIHZ0YWJsZS5jYWxsb2MgPSBzd2l0Y2hfY2FsbG9jOw0K KysgICAgICAgIGdfbWVtX3NldF92dGFibGUgKCZ2dGFibGUpOw0KKysgICAgfSBlbHNlIHsNCisr ICAgICAgICBnX3dhcm5pbmcgKCJVbmFibGUgdG8gYWxsb2NhdGUgc2VjdXJlIG1lbW9yeSBmcm9t IGdub21lLWtleXJpbmcuXG4iKTsNCisrICAgICAgICBnX3dhcm5pbmcgKCJQcm9jZWVkaW5nIHdp dGggaW5zZWN1cmUgcGFzc3dvcmQgbWVtb3J5IGluc3RlYWQuXG4iKTsNCisrICAgIH0NCisgfQ0K KyANCisrZ2Jvb2xlYW4NCisrc2VhaG9yc2VfdHJ5X2drX3NlY3VyZV9tZW1vcnkgKCkNCisrew0K KysgICAgZ3BvaW50ZXIgcDsNCisrDQorKyAgICBwID0gZ25vbWVfa2V5cmluZ19tZW1vcnlfdHJ5 X2FsbG9jICgxMCk7DQorKyAgICBpZiAocCAhPSBOVUxMKSB7DQorKyAgICAgICAgZ25vbWVfa2V5 cmluZ19tZW1vcnlfZnJlZSAocCk7DQorKyAgICAgICAgcmV0dXJuIFRSVUU7DQorKyAgICB9DQor Kw0KKysgICAgcmV0dXJuIEZBTFNFOw0KKyt9DQpkaWZmIC0tZ2l0IGEvc2VjdXJpdHkvc2VhaG9y c2UvZmlsZXMvcGF0Y2gtbGlic2VhaG9yc2Vfc2VhaG9yc2Utc2VjdXJlLW1lbW9yeS5oIGIvc2Vj dXJpdHkvc2VhaG9yc2UvZmlsZXMvcGF0Y2gtbGlic2VhaG9yc2Vfc2VhaG9yc2Utc2VjdXJlLW1l bW9yeS5oDQpuZXcgZmlsZSBtb2RlIDEwMDY0NA0KaW5kZXggMDAwMDAwMC4uMzU0YjU2Mw0KLS0t IC9kZXYvbnVsbA0KKysrIGIvc2VjdXJpdHkvc2VhaG9yc2UvZmlsZXMvcGF0Y2gtbGlic2VhaG9y c2Vfc2VhaG9yc2Utc2VjdXJlLW1lbW9yeS5oDQpAQCAtMCwwICsxLDExIEBADQorLS0tIGxpYnNl YWhvcnNlL3NlYWhvcnNlLXNlY3VyZS1tZW1vcnkuaC5vcmlnCTIwMDgtMDQtMTEgMDk6MzM6MzQu MDAwMDAwMDAwIC0wNDAwDQorKysrIGxpYnNlYWhvcnNlL3NlYWhvcnNlLXNlY3VyZS1tZW1vcnku aAkyMDA4LTA0LTExIDA5OjM0OjEyLjAwMDAwMDAwMCAtMDQwMA0KK0BAIC0zNCw2ICszNCw3IEBA DQorICAgICB9IHdoaWxlICgwKQ0KKyANCisgLyogVGhpcyBtdXN0IGJlIGNhbGxlZCBiZWZvcmUg YW55IGdsaWIvZ3RrL2dub21lIGZ1bmN0aW9ucyAqLw0KKy12b2lkICAgIHNlYWhvcnNlX3NlY3Vy ZV9tZW1vcnlfaW5pdCAgICAgICAgICh2b2lkKTsNCisrdm9pZCAgICAgc2VhaG9yc2Vfc2VjdXJl X21lbW9yeV9pbml0ICAgICAgICAgKHZvaWQpOw0KKytnYm9vbGVhbiBzZWFob3JzZV90cnlfZ2tf c2VjdXJlX21lbW9yeSAgICAgICh2b2lkKTsNCisgDQorICNlbmRpZiAvKiBfU0VBSE9SU0VfU0VD VVJFX01FTU9SWV9IXyAqLw0K --=-4lgvQw6sVZ+aCW4h2MeR-- --=-QU9gGQmVx5cG5PtPBIoB Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (FreeBSD) iEYEABECAAYFAkgA5r8ACgkQcMSxQcXat5cgxgCbBxkjBKM7SIvvU1qbjc5ddF80 ydQAnjVUE4pT+Wg/3m0we0JcrvnHqIv3 =7Pa9 -----END PGP SIGNATURE----- --=-QU9gGQmVx5cG5PtPBIoB--