[GRASS-dev] GSoC 2014: GRAS GIS Web UI
Blumentrath, Stefan
Stefan.Blumentrath at nina.no
Sun Mar 9 13:37:19 PDT 2014
Hi,
Some more user comments: When we installed RStudio server in our company, our network administrator actually only agreed, because we could limit the listening-addresses / the server was not available from the internet and only accessible within the trusted company network. The same would likely be true for a GRASS web-interface too. So like Massimo, I would guess that the "trused-user" approach would be the most popular...
In fact, the only use-case I can imagine for an anonymous web access to a GRASS installation would be demonstration / marketing, that people can have a closer look without installing. But that would require, that the web UI is comparable to the desktop solution to give a comparable impression... Would be anonymous www-access be possible at all? I mean, how would one exclude concurrent use of a mapset, i.e. two anonymous users accessing the same mapset at the same time?
Cheers
Stefan
From: grass-dev-bounces at lists.osgeo.org [mailto:grass-dev-bounces at lists.osgeo.org] On Behalf Of epi
Sent: 9. mars 2014 15:28
To: Glynn Clements
Cc: grass-dev at lists.osgeo.org
Subject: Re: [GRASS-dev] GSoC 2014: GRAS GIS Web UI
Glynn,
I'aware that the "security risk handling" in a web app is a hard and hot topic, hopefully a lot of project are working on this direction
Of course a web-ui for grass will be designed for registered users and not for the anonymous www (password, registration and https can be implemented)
The "web-shell" feature is obviously reserved to only "trusted users".
without this assumption application like Rstudio or IPython notebook should not exist.
A multi user approach needs to be based IMHO on unix each user has to have its own home and access to filesystem. If this is not enough the application can be restricted to a chroot jail but this is not part of the UI development (is more a sys admin choice)
For the authorization protocol it can be implemented using PAM. (i guess is what Rstudio is using)
WT has a mature authentication module
http://www.webtoolkit.eu/wt/blog/2011/11/29/wt___jwt_3_2_0
http://www.webtoolkit.eu/wt/blog/2013/08/07/security__wt_and_the_new_breach_vulnerability/
The potential user of a web ui for grass, need to be a trusted user in any case and need to go trough a registration process where an admin as to approve it. not anonymous users allowed.
I guess the code behind the web-ui has to sanitize each text entry, will be this enough ?
A "sanitize inspection" on all the "input" coming from the web-ui can be performed and this will be part of the UI itself, not of the grass modules. with the aim to avoid people doing something like .. http://xkcd.com/327/ ;)
Massimo.
On Mar 8, 2014, at 11:42 AM, Glynn Clements <glynn at gclements.plus.com<mailto:glynn at gclements.plus.com>> wrote:
Rashad M wrote:
My main concern would be security.
You will need to thoroughly sanitise all inputs. You cannot rely upon
GRASS modules to do this, as e.g. most string handling uses fixed-size
buffers, so you need to explicitly limit the length of any arguments
to avoid the possibility of buffer overruns.
I am not clear with this. maybe security and web apps are creating me a
confusion.
If you do not understand the principles of secure programming, you
shouldn't attempt to write a web interface to GRASS.
GRASS modules typically do not attempt to be secure against invalid
input. If you're providing access to "untrusted" users (users who
aren't supposed to have the full privileges of the account under which
the modules are executed), you will need to prevent invalid input from
reaching the modules.
--
Glynn Clements <glynn at gclements.plus.com<mailto:glynn at gclements.plus.com>>
_______________________________________________
grass-dev mailing list
grass-dev at lists.osgeo.org<mailto:grass-dev at lists.osgeo.org>
http://lists.osgeo.org/mailman/listinfo/grass-dev
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osgeo.org/pipermail/grass-dev/attachments/20140309/50b10e33/attachment.html>
More information about the grass-dev
mailing list