-
-
Notifications
You must be signed in to change notification settings - Fork 302
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
read only sessions #84
Comments
Hi Jan Christoph, how is your suggestion different from the current readonly implementation? |
Ah is it already implemented? I was under the impression that always both types are created in the slave. So that you can connect to a read write session if you have or guess a valid key, is this not the case? |
I'm not sure what's the benefit compared to the current implementation where you can pick the r/w or read-only connection string. |
Assuming an attacker can try a million tokens per second (which will hardly go unnoticed), So I wouldn't worry about someone guessing a valid key. |
Maybe the user gives out the wrong key because he has a bad day. An alias tmate="tmate --read-only" could save the day. I tend to do stuff like that on some systems really often. And be it so nobody powers down a server when he is about to shutdown his laptop to go home. The ability to modify such behavior is really useful. |
I see. I'll think about it in how to address the issue. |
Hi @nviennot Can you add this feature? It would be great to be able to launch readonly mode. |
In the past I've given out read-only connection strings only to have someone discover the read-write string was visible in the terminal. Having a read-only mode that doesn't provide/show a read-write connection string would be useful to prevent these types of mistakes. |
Good point. Will add to the wish list. |
For me one thing would even be sufficient: Having a I'm live streaming programming sessions and am using Thanks in advance for you SUPERB work. You have made my life so much easier. I really do appreciate it |
default should be |
I agree, but I won't fix this anytime soon. As a workaround, one can run:
And then run |
@nviennot I would love to have a Would you be able to point me in the right direction so that I can work on a patch that does this? I see from your git history that you commits begin in June 1, 2013 where you add 4 source files,
So my questions are:
|
I suggest hiding the write access session keys. In static void handle_notify(__unused struct tmate_session *session,
struct tmate_unpacker *uk)
{
char *msg = unpack_string(uk);
if (!strstr(msg, "session: "))
tmate_status_message("%s", msg);
free(msg);
} The |
Is there a technical issue that keeps you from implementing read only sessions? Why do you insist on hiding just the string? What if people are not concerned about people guessing random numbers but you? |
There's no technical limitations. If someone sends a pull request for this
feature that can be enabled by a --flag or an ENV variable, I'll take it
…On Sat, Feb 20, 2021 at 9:04 AM Jan Christoph Uhde ***@***.***> wrote:
Is there a technical issue that keeps you from implementing read only
sessions? Why do you insist on hiding just the string? What if people are
not concerned about people guessing random numbers but you?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#84 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AACIQZEPHXJL6KHHSOOPI5DS766N3ANCNFSM4CDFTYEQ>
.
|
@ObiWahn read-only sessions are implemented in pull request #207 which you can enable with |
@omsai The default setting should always be the securest setting. |
Typically, ease-of-use and security are opposite forces. When implementing
a feature, we must consider user experience while keeping the system
reasonably secure against plausible threats. We must be cognisant of the
user experience impact when adding security layers.
In fact, one could argue that the most secure thing to do is to not use
tmate at all, or avoiding turning on computers, but that would not be a
satisfying experience for most.
The default setting should be what most users want, in my opinion. From
what I gathered over the years, the current default settings are adequate.
I think the need for having a more explicit (and secure) interface can be
achieved by having a more low-level layer that tmate can build upon. This
way, different cliques of users having different needs can be satisfied
equally.
…On Sun, Feb 21, 2021, 12:05 Jonas Stein ***@***.***> wrote:
@omsai <https://github.com/omsai> The default setting should always be
the securest setting.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#84 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AACIQZA7TCFLC4KHGPHVWLDTAE4MXANCNFSM4CDFTYEQ>
.
|
To be honest @nviennot is right on the trust issue:-) It reminds me of the ACM classic "reflections on trusting trust". If tmate-io would just collect all passwords it can get it was bad enough:) Still for me just always sharing ro would be the best. And I would argue that rw is the setting most users want iff tmate would be used by hairdressers and plumbers. But you deal with technical people that rather use a terminal than zoom. And all individuals in this group I know of are pretty restrictive when it comes to their Of course there are ways to mitigate the default rw behavior of tmate like: having an extra user that instantly denies sudo and su and does not have a lot of rights on the system. For now I have uninstalled tmate on all private machines and use wemux with trusted friends. Somehow I have the illusion that my PC is more secure. But it is probably just my head playing tricks:-) And I think the sessions should timeout after an hour or so. Yesterday I found a 2 days old session:( |
Hi Nicolas,
i think it would be cool if a client could request to create a remote read only tmux server. I think it goes in the direction of the 3rd crossed out point in the future work section.
Maybe a "bool allow_read_only" could be added to tmate_session for the "server/demon role". Is that correct place for such information?
Regards
Jan
The text was updated successfully, but these errors were encountered: