KDE Ends 2021 With More Plasma Wayland Fixes, Root File Operations For Dolphin
Collapse
X
-
Kde developers should separate Neon based on x11 and Neon based on wayland replacing kwin with a wayland vulkan compositor.
-
-
Originally posted by mdedetrich View PostAgain, actual KDE developers said otherwise, it was repriotized (whether it was "officially" done via bug tracker is another story). It got more attention than it normally would have which means it came out faster.
So said it was repriotised but nothing changed in the coding development side. There was a repriotisation but its not where you were thinking
Originally posted by mdedetrich View PostOverall the net effect was positive, the initial release may not be perfect but it can be iterated on and improved over time.
Its one thing to put a spot light on a issue but we have to work out someway to put a spotlight on a issue that does not end up spamming the developers trying to make it work.
Yes people want to think that something like Linus tech tips would have a positive effect the reality is it had zero effect other than those attempting to manage the problem using careful wording so they said they repriotised something around KIO polkit and everyone nicely run with that the development work has to be speed up slowed down the spam and so bug tracker triage people had been repriotised away from other bugs to control the spam that would not have existed without the video.
You could call your so call claim of net positive to be nothing more than a placebo effect that you fell for hook line and sinker. When you did into what in fact happened that it was triage people reallocated noting todo with the code development of KIO polkit changed other than the channel of communication between the writer of the Polkit code and reviewer of the polkit code being disrupted by spam caused by the video.
Now that video could have been a positive if people had put up more resource to develop the feature instead of spam complaining. Yes lot of claims of don't bother with the polkit integration just allow the file manager to run as root that had already been covered many times over.
The problem here is the Linus Tech Tips video was not exactly useful. Yes spotted a user issue then published it massively without explain exactly why KDE was going the polkit route particular that there was no other choice long term. The requirement for wayland and X.org X11 server running as user both do not like graphical applications running as root. Also there are stability issues running as root that are well documented.
The problem here is from the Linus Tech Tip video set a stack of unformed people lose on the KDE issue system and end up causing disruption instead of any help.
It would be a different matter if there were more developers working on the KDE polkit feature or the developer doing the KDE polkit work got more hours to work on it but this did not happen. The reality is the development of KDE polkit stuff did not change in any positive way from the Linus Tech Tips video.
Lot of ways it does not pay to sugar coat what happened here. Smaller projects would not have had the resources to handle this. Even so people who have reported true problems end up being slower seen to. Reality that Linus tech tips video was a net negative nothing has happened that would not have happened anyhow.
The question that need to be answered is there any way in future to handle stuff like this and not cause major problems. Maybe Linus of Linus tech tips should have open a issue on the KDE issue system and gave his user a link to there so that their complaints and issues did not end up disrupting the development work in a major way? Remember smaller project would not have has the resources to handle the people hitting the issue system in this way.
The people who miss behaved is why that video should not be giving any credit for anything positive or they will do it next time as well to possible a smaller project that cannot handle it.
Leave a comment:
-
-
Originally posted by bug77 View PostKDE Ends 2022 [...]
Highlights from 2021
https://pointieststick.com/2021/12/3...hts-from-2021/
Leave a comment:
-
-
Originally posted by markg85 View PostI don't buy those arguments.
What you say there can also happen as a user.
The only reason (i can think of) that would justify running it as a user is to make it more fool proof. That as a reason would be acceptable as it makes it easier for tech savvy users to run such an application. As root you might need to get warnings about that. Let the user know that it's not the advised way etc... but not forbid it.
Originally posted by markg85 View PostIThe problem i have with this paranoid security that happened back then was the urge to immediately fix it while it was very much an edge case and not that likely to be widely exploited. A fix (with polkit) was known back then too but the whole stack wasn't ready for it. Hence it taking so long till it finally landed.
The proper way would have been to leave it "broken" and inform the users that it's not advices to run it as root. Then get working on the proper fix to transition from one mechanism to the other. Not to bluntly nuke the root route (now only the sudo route) and stay in that state for years till the polkit route has gotten enough support.
There's also a lot of blame to place on the security folks here too. Fine if they do research and find holes. They do often also point out where that hole is and what a fix could be. Thus far they did a fine job. But it stopped right there. The solution was to nuke a feature. Not to properly explain how the hole could be dangerous. Not to poke the right people (polkit ones) to let them know that a proper fix would be to get polkit widely adopted. And yes, i do expect the security researchers to do that! They put in the time to find holes, let others fix their findings then also put in the effort to at least make the fix as minimally invasive as possible. Aka, NOT to nuke a feature but to get it working without the issue persisting.
Exploit in wild means you have to counter measures.
Originally posted by markg85 View PostII do (or did) understand it perfectly fine. That's over 10 years ago.
I surely don't vividly remember the exact details.
Remember markg85 dolphin file-manger does at time crash.
Yes when I looked at this there are 84 open crash bugs. Do you really fell lucky here that none of these crashes with higher capabilities is not doing to do worse than just crash. I can tell you there are some in there that will do worse. Yes safe to happen when lower capabilities not safe with the extra capabilities that sudo/root provides.
Originally posted by markg85 View PostGranted, i've only very rarely been in the position where i actually needed a graphical Dolpin ever since it became impossible to run as sudo. I think only once or twice.
Please note KDE delayed the disabling of the dolphin sudo until Gnome files worked for the task using polkit. So terminal or gnome files(already using polkit at this stage) could do the job safely. So users could still do their tasks graphically ok they had to use gnome parts but data safety wins over a little inconvenience.
Also developing the new polkit interface they need to know in more details what people in fact need to-do as higher capabilities user. Yes you can attempt to survey people but that generally does not work(there is a phone that a classic example of this failure) now of you break their workflow and read the bug reports you get a lot more correct data as well. So there was a second reason to be a pain in the ass here. Security meant they should disable the feature and disabling the feature would get them the feedback to make the replacement.
Yes Linus of Linus tech tips did find gnome files and it did work to perform the task without need to run gnome files complete as root./sudo risks of a highly complex graphical application.
markg85 the hard reality here majority of security faults are not found by security people attempting to find faults instead come from software developers users reporting bugs and developers asking security people to look at what is going on to assist developing a fix.
Leave a comment:
-
-
Originally posted by oiaohm View Post
Until you check the priority list. Yes what is written in reddit and what happened are two different things. The feature was priority for the next major KDE release from 2019.
Originally posted by oiaohm View PostYes Linus tech tip videos had effects and they were not all positive. Like the recent merge due to Linus tech tip video caused spam is 4 weeks behind because the merge review request got lost in spam. So yes KDE developers are fairly media aware. Yes the post on reddit was more about stopping a disaster of operation disruptions that if it was not brought under control was going to push the late KIO polkit feature even latter. The reality there was no where high to go on the priority list than where KIO polkit was before Linus tech tips made their videos.
KIO polkit is need on the Wayland side and on the user mode only x.org X11 server as it does not accept connections from different user out box. This problem was detailed in 2019. Getting it working right has been the major problem.
There are still over 100 known code quality faults to fix in the KIO polkit code to fix yet. Hopefully none of them are deal breakers.
Leave a comment:
-
-
Originally posted by mdedetrich View PostI think its ridiculously naive to claim that Linus's video had no impact. Yes the work has been ongoing but the amount of traction that Linus brings put that specific issue higher on the priority list and this was even admitted by KDE developers on reddit in response to his video.
In reality the core complaint that Linus had is correct, which is that from a purely non advanced user experience point of view the situation was terrible and telling people to "use a CLI instead" completely misses the point.
If the Linus video wasn't made then it may have taken another couple or so years to push that final 20% to get it out.
Yes Linus tech tip videos had effects and they were not all positive. Like the recent merge due to Linus tech tip video caused spam is 4 weeks behind because the merge review request got lost in spam. So yes KDE developers are fairly media aware. Yes the post on reddit was more about stopping a disaster of operation disruptions that if it was not brought under control was going to push the late KIO polkit feature even latter. The reality there was no where high to go on the priority list than where KIO polkit was before Linus tech tips made their videos.
KIO polkit is need on the Wayland side and on the user mode only x.org X11 server as it does not accept connections from different user out box. This problem was detailed in 2019. Getting it working right has been the major problem.
There are still over 100 known code quality faults to fix in the KIO polkit code to fix yet. Hopefully none of them are deal breakers.
Leave a comment:
-
-
Originally posted by bug77 View PostLet's give a hand to Michael with next year's article: " KDE Ends 2022 With More Plasma Wayland Fixes..."
Leave a comment:
-
-
Originally posted by oiaohm View Post
This shows something that you never understood the problem.
Kali Linux a security distribution made all the same kind of arguments you did about being only a single user running as root would be fine. Yes they found for wifi attacks and so on running with root capabilities was faster but they also found when it goes wrong the stuff goes wrong in a big way.
Running kodi as root with all capabilities (privileges) and something goes wrong instead of being a simple restart the system fix as it would have been as a normal user its a complete reinstall possible with complete data loss. Yes the power of the root granted .
What you say there can also happen as a user.
The only reason (i can think of) that would justify running it as a user is to make it more fool proof. That as a reason would be acceptable as it makes it easier for tech savvy users to run such an application. As root you might need to get warnings about that. Let the user know that it's not the advised way etc... but not forbid it.
Originally posted by oiaohm View Posthttps://securityboulevard.com/2020/0...-on-kali-2020/ Yes it took them until 2020 to change it. Of course you still have users forcing their way back as running as root and not understanding the level of danger they are playing with.
The hard reality is running any more than you need to as root is not a good idea and will cause you trouble at some point or another.
do take a look at capabilities some time.
You will find something dangerous when you are running with
Yes CAP_SYS_ADMIN is the privilege we really do align with root operations and do note the nightmare here is not properly defined. Problem is this alters even how the OOM Killer responds to the application. and what memory and disc space you are allowed to allocate. Yes allowed to allocate without the normal safe guards so you could be forcing the kernel to suspend kernel processes that should be happening your process to proceed that would have just shared processing time and proceed in background if you were not with CAP_SYS_ADMIN..
The fault has been seen for over 20 years now. The problem is security related and it does not require multi users as such because the Linux kernel behaves different between a normal user account/non capability process and a root/capability granted process..
Linux root for capabilities granted is closest user on MS Windows user is SYSTEM. Do note under windows you normally cannot log in as system. Yes administrator account under windows are not the most privileged account you can see it at times when there are in use files that windows administrator account cannot delete but if you are running as windows SYSTEM user or using a tool running a bit as Windows SYSTEM user you can. Yes at time when stuff goes wrong with a process running windows system user it can be a reinstall as well.
Like it or not users running applications normally don't need the full rights to-do everything. That everything is ultra broad and has many downsides.
Early Late 1990s early 2000 it was found running graphical applications as root/privilege capabilities resulted in different behavour on Linux and early 2000 it was found that this different behavour could have adverse effects. Yes this reality people keep on wanting to ignore.
I surely don't vividly remember the exact details.
The problem i have with this paranoid security that happened back then was the urge to immediately fix it while it was very much an edge case and not that likely to be widely exploited. A fix (with polkit) was known back then too but the whole stack wasn't ready for it. Hence it taking so long till it finally landed.
The proper way would have been to leave it "broken" and inform the users that it's not advices to run it as root. Then get working on the proper fix to transition from one mechanism to the other. Not to bluntly nuke the root route (now only the sudo route) and stay in that state for years till the polkit route has gotten enough support.
There's also a lot of blame to place on the security folks here too. Fine if they do research and find holes. They do often also point out where that hole is and what a fix could be. Thus far they did a fine job. But it stopped right there. The solution was to nuke a feature. Not to properly explain how the hole could be dangerous. Not to poke the right people (polkit ones) to let them know that a proper fix would be to get polkit widely adopted. And yes, i do expect the security researchers to do that! They put in the time to find holes, let others fix their findings then also put in the effort to at least make the fix as minimally invasive as possible. Aka, NOT to nuke a feature but to get it working without the issue persisting.
Granted, i've only very rarely been in the position where i actually needed a graphical Dolpin ever since it became impossible to run as sudo. I think only once or twice.
Leave a comment:
-
-
Originally posted by oiaohm View Post
The answer is no Linus video did not change anything about the speed. Security of stuff like this takes while.
In reality the core complaint that Linus had is correct, which is that from a purely non advanced user experience point of view the situation was terrible and telling people to "use a CLI instead" completely misses the point.
If the Linus video wasn't made then it may have taken another couple or so years to push that final 20% to get it out.
Leave a comment:
-
-
Let's give a hand to Michael with next year's article: " KDE Ends 2022 With More Plasma Wayland Fixes..."
Leave a comment:
-
Leave a comment: