[GRASS-dev] GSoC 2014: GRAS GIS Web UI

epi massimodisasha at gmail.com
Sun Mar 9 23:00:29 PDT 2014


Hi Stefan,

about anonymous access, the app  can use a demo location that is generated on the fly using cloning a "template location".
If i well remember, PyWPS does something like that.

But you need to be limit the number of available instance running … (has to be a configurable option), to avoid a server overload.
how may anonymous users can test the app at the same time is up to the capabilities of your server.

Cheers,
Massimo.

On Mar 9, 2014, at 4:37 PM, Blumentrath, Stefan <Stefan.Blumentrath at nina.no> wrote:

> Hi,
>  
> Some more user comments: When we installed RStudio server in our company, our network administrator actually only agreed, because we could limit the listening-addresses / the server was not available from the internet and only accessible within the trusted company network. The same would likely be true for a GRASS web-interface too. So like Massimo, I would guess that the “trused-user” approach would be the most popular…
>  
> In fact, the only use-case I can imagine for an anonymous web access to a GRASS installation would be demonstration / marketing, that people can have a closer look without installing. But that would require, that the web UI is comparable to the desktop solution to give a comparable impression… Would be anonymous www-access be possible at all? I mean, how would one exclude concurrent use of a mapset, i.e. two anonymous users accessing the same mapset at the same time?
>  
> Cheers
> Stefan  
>  
> From: grass-dev-bounces at lists.osgeo.org [mailto:grass-dev-bounces at lists.osgeo.org] On Behalf Of epi
> Sent: 9. mars 2014 15:28
> To: Glynn Clements
> Cc: grass-dev at lists.osgeo.org
> Subject: Re: [GRASS-dev] GSoC 2014: GRAS GIS Web UI
>  
> Glynn,
>  
> I’aware that the "security risk handling" in a web app is a hard and hot topic, hopefully a lot of project are working on this direction 
> Of course a web-ui for grass will be designed for registered users and not for the anonymous www (password, registration and https can be implemented) 
>  
> The “web-shell”  feature  is obviously  reserved to only “trusted users”.
> without this assumption application like Rstudio or IPython notebook should not exist.
>  
> A multi user approach needs to be based IMHO on unix each user has to have its own home and access to filesystem. If this is not enough the application can be restricted  to a chroot jail but this is not part of the UI development (is more a sys admin choice)
>  
> For the authorization protocol it can be implemented using PAM. (i guess is what Rstudio is using)
> WT has a mature authentication module 
>  
> http://www.webtoolkit.eu/wt/blog/2011/11/29/wt___jwt_3_2_0
> http://www.webtoolkit.eu/wt/blog/2013/08/07/security__wt_and_the_new_breach_vulnerability/
>  
> The potential user of a web ui for grass, need to be a trusted user in any case and need to go trough a registration process where an admin as to approve it. not anonymous users allowed.
>  
> I guess  the code behind the web-ui has to sanitize each text entry, will be this enough ?
> A "sanitize inspection" on all the “input” coming from the web-ui can be performed and this will be part of the UI itself, not of the grass modules. with the aim to avoid people doing something like   .. http://xkcd.com/327/  ;)
>  
>  
> Massimo.
>  
>  
> On Mar 8, 2014, at 11:42 AM, Glynn Clements <glynn at gclements.plus.com> wrote:
> 
> 
> 
> Rashad M wrote:
> 
> 
> My main concern would be security.
> 
> You will need to thoroughly sanitise all inputs. You cannot rely upon
> GRASS modules to do this, as e.g. most string handling uses fixed-size
> buffers, so you need to explicitly limit the length of any arguments
> to avoid the possibility of buffer overruns.
> 
> I am not clear with this. maybe security and web apps are creating me a
> confusion.
> 
> If you do not understand the principles of secure programming, you
> shouldn't attempt to write a web interface to GRASS.
> 
> GRASS modules typically do not attempt to be secure against invalid
> input. If you're providing access to "untrusted" users (users who
> aren't supposed to have the full privileges of the account under which
> the modules are executed), you will need to prevent invalid input from
> reaching the modules.
> 
> -- 
> Glynn Clements <glynn at gclements.plus.com>
> _______________________________________________
> grass-dev mailing list
> grass-dev at lists.osgeo.org
> http://lists.osgeo.org/mailman/listinfo/grass-dev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osgeo.org/pipermail/grass-dev/attachments/20140310/d4ed9bd1/attachment-0001.html>


More information about the grass-dev mailing list