[GRASS-dev] GSoC 2014: GRAS GIS Web UI

epi massimodisasha at gmail.com
Sun Mar 9 07:28:15 PDT 2014


Glynn,

I’aware that the "security risk handling" in a web app is a hard and hot topic, hopefully a lot of project are working on this direction 
Of course a web-ui for grass will be designed for registered users and not for the anonymous www (password, registration and https can be implemented) 

The “web-shell”  feature  is obviously  reserved to only “trusted users”.
without this assumption application like Rstudio or IPython notebook should not exist.

A multi user approach needs to be based IMHO on unix each user has to have its own home and access to filesystem. If this is not enough the application can be restricted  to a chroot jail but this is not part of the UI development (is more a sys admin choice)

For the authorization protocol it can be implemented using PAM. (i guess is what Rstudio is using)
WT has a mature authentication module 

http://www.webtoolkit.eu/wt/blog/2011/11/29/wt___jwt_3_2_0
http://www.webtoolkit.eu/wt/blog/2013/08/07/security__wt_and_the_new_breach_vulnerability/

The potential user of a web ui for grass, need to be a trusted user in any case and need to go trough a registration process where an admin as to approve it. not anonymous users allowed.

I guess  the code behind the web-ui has to sanitize each text entry, will be this enough ?
A "sanitize inspection" on all the “input” coming from the web-ui can be performed and this will be part of the UI itself, not of the grass modules. with the aim to avoid people doing something like   .. http://xkcd.com/327/  ;)


Massimo.


On Mar 8, 2014, at 11:42 AM, Glynn Clements <glynn at gclements.plus.com> wrote:

> 
> Rashad M wrote:
> 
>>> My main concern would be security.
>>> 
>>> You will need to thoroughly sanitise all inputs. You cannot rely upon
>>> GRASS modules to do this, as e.g. most string handling uses fixed-size
>>> buffers, so you need to explicitly limit the length of any arguments
>>> to avoid the possibility of buffer overruns.
>> 
>> I am not clear with this. maybe security and web apps are creating me a
>> confusion.
> 
> If you do not understand the principles of secure programming, you
> shouldn't attempt to write a web interface to GRASS.
> 
> GRASS modules typically do not attempt to be secure against invalid
> input. If you're providing access to "untrusted" users (users who
> aren't supposed to have the full privileges of the account under which
> the modules are executed), you will need to prevent invalid input from
> reaching the modules.
> 
> -- 
> Glynn Clements <glynn at gclements.plus.com>
> _______________________________________________
> grass-dev mailing list
> grass-dev at lists.osgeo.org
> http://lists.osgeo.org/mailman/listinfo/grass-dev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osgeo.org/pipermail/grass-dev/attachments/20140309/29fa4981/attachment.html>


More information about the grass-dev mailing list