[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: zero install - serious critiques?



On 1/13/06, David M. Besonen <davidb@panix.com> wrote:
> On Fri, 13 Jan 2006 15:51:20 +0100, Joris Huizer
> <jorishuizer@planet.nl> wrote:
>
> >you may see this as some problem:
> >
> >"Isn't running stuff off the net a security risk?
> >Isn't that where you get your software from anyway? Zero Install
> >automatically performs a number of checks for you (such as checking MD5
> >sums and GPG signatures), and since it doesn't run any of the remote
> >code as root, you can try software out safely as a 'guest' user. Once
> >downloaded, the programs are run from the cache, without even checking
> >the original sites for updates (you have to tell it to update manually)."
> >
> >That means: no security updates or whatever I guess
>
> right.  this problem is part and parcel of all gnu/linux "bundled
> application" solutions that are available atm iirc.  no?  a trade-off
> of less security for greater ease of use by the enduser.
>
> the upside seems to be that the end-user is less likely to fubar the
> whole os if they zero install some malware since the zero install
> system says it confines all activity to user space.  am i
> understanding this correctly?
>
> peace,
> david
>
>
> --
> To UNSUBSCRIBE, email to debian-user-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
>
>

wow.  http://zero-install.sourceforge.net/compare.html reads like "get
the facts".

"Debian has three separate places where software is installed"
What user cares where the package installed?  As long as the software
works, what's the problem?

"Our student just wants to run the software."
Good for 'our student'.  However, he doesn't own that machine, now
does he?  He is not responsible for the operation of said machine
either.  He is however, supposed to use the system within the the
policy dictated by the administrator, school, etc.  Being able to run
whatever you want, could just be an issue in some scenarios.  So what
now?  Have the administrator have to black or whitelist an endless
list of packages?  No thx, not for this admin.

"Running anything as root is a security risk. If the Debian package
for AbiWord contains malicious code (or just a simple bug), it will be
running that code as root, with full power to do anything it likes to
the machine."
Well, if you can't trust the software you are installing, much less
the system it is being installed upon, well, I'll just leave it at
that.  (so really, a non-issue)

"APT relies on a database to keep track of what's installed and what
isn't. This database must be kept in sync with the filesystem... if
the user deletes a file to save space, then APT will continue to think
that the file is installed."
Deleting a system installed file would require the user to have root
access.  If this is the case, there is no system level security at
all.  (yet another non-issue)

"APT often downloads more than you need. Some packages have been
split, for example 'python' and 'python-doc', but most packages
require you to download a considerable amount of data that you simply
don't need."
Eh?  Methinks he's confusing debian/dpkg systems with some fairly
braindead, albeit popular, bloated packaging system.  (swing and a
miss)

"Despite trying to download every file for every feature of a program
you might possibly need, APT still often fails to get things you want.
For example: install gqview and open an image. Choose 'Edit in Gimp'
from the menu, and you'll get an error complaining that Gimp isn't
installed."
That's why there are things like apt policies to install suggested
packages, or even auto-apt.  (omg u loose agane!!!!11)

"APT is not scalable:  Since every package is installed as root, every
package must be carefully checked by a trusted Debian developer."
Really now?  News to me.  Last I checked, debian, maybe ubuntu had the
most packages available of any linux distro.  And again, security
actually matters to some people.  Trust the debian team or trust ...
whoever.  Riiiiiiight.  (sorry, no dice)

and then they go on to say ...

"Anyone can make software available via Zero Install. Trust is for
individual users to decide, not the admin, since their choices only
affect them."
Oh, if that were only how computer security *actually* worked.  Yes,
sometimes user code can be used to exploit root level vulnerabilities,
even under linux.  Nice try, though.

and then, here: http://zero-install.sourceforge.net/filesystem.html
they describe how applications are cached, so that multiple users on
the same system only work off of one instance of a program in the
zero-install cache.  So, exactly how is that only affecting one user
again?  Right, it isn't.  (BZZZZT!)

"APT must download the latest package listing for the whole archive
before doing anything."
Well, I have news for you.  If you're on a slow enough connection that
you can't stand waiting for the packages list to download, just wait
until you try to install any software, either via apt or zero-install.
 Yeah, go "zero-install" open office. (no cookie)

"Upgrading is very slow ... it requires downloading a vast amount of
software, most of which won't be used before it's upgraded again."
Oh yes, much better to run a system where the older software packages,
the ones with possible security issues, stay on the system the
longest.  Brilliant!

Ok, I'll just stop there.  Yeah, it's a really slow day at work ;-)


--
Noah Dain
"Single failures can occur for a variety of reasons that have nothing
to do with a hardware defect, such as cosmic radiation ..." - IBM
Thinkpad R40 maintenance manual, page 25



Reply to: