unofficial mirror of guix-patches@gnu.org 
 help / color / mirror / code / Atom feed
From: "Ludovic Courtès" <ludo@gnu.org>
To: Mathieu Othacehe <othacehe@gnu.org>
Cc: 52866@debbugs.gnu.org
Subject: [bug#52866] maintenance: Add a crash dump service.
Date: Tue, 11 Jan 2022 14:10:56 +0100	[thread overview]
Message-ID: <875yqqv2n3.fsf@gnu.org> (raw)
In-Reply-To: <871r1lw9wx.fsf@gnu.org> (Mathieu Othacehe's message of "Thu, 06 Jan 2022 09:22:38 +0100")

Hi,

Mathieu Othacehe <othacehe@gnu.org> skribis:

>> Or, dump.guix.gnu.org could relay everything as-is to bug-guix@gnu.org
>> *if* we know users are aware of what data is being reported.
>
> That's something that also crossed my mind, but I chose instead to make
> the web-server publish the bug reports here: https://dump.guix.gnu.org.
> They can then be downloaded with this URL:
> https://dump.guix.gnu.org/download/<id>.
>
> Of course the next step it to use this API in a command line tool or
> so. I don't feel like working on another web interface.

OK (I didn’t know it was already deployed!).  What if we just put the
uploaded file in a directory and let nginx provide a directory index and
all?  Anyway, given the target audience, it doesn’t have to be fancy.
:-)

> Regarding the installer integration, you can have a look to:
> https://git.savannah.gnu.org/cgit/guix.git/commit/?h=wip-harden-installer&id=22158d407af89d2f3df3abd8005ec2321df45c74.

At first sight it LGTM.  The key thing is that the crash dump code must
be programmed “defensively” so that it never crashes itself; it should
gracefully handle transient network errors, TLS certificate issues, bad
HTTP responses, etc., and just say it when it failed to upload the
report.

> There's already a window asking before uploading the crash dump. I think
> that if we make the warning message even more explicit it could be fine.

The message should allow for informed consent.  Thus it should explain
what the risks are (“Logs may contain sensitive information such as …”,
“Logs are eventually publicly visible, but IP addresses are not logged”,
etc.) and/or it should let users screen all the logs.

Josselin Poiret <dev@jpoiret.xyz> skribis:

> While looking at the code for the crash dump page in the installer, I
> didn't see any special handling of user and root passwords.  I've just
> tested it at https://dump.guix.gnu.org/download/installer-dump-c9deb88f,
> and you can see that the passwords end up in the results at the end
> (both are `TEST` in capitals in my case).  I think this might require
> more thought.  I'm not sure we have to include the result alist in the
> dump report, as the installer log should provide enough information in
> the case of a failure.

As discussed the other day on IRC, to make sure the backtrace does not
contain passwords, we could define a record type for “secrets”, which
would basically just “box” strings such as passwords.  That record
type’s printer would just print #<secret 0123abcd>.  See
<file-system-label> for an example.

> Concerning Ludo's objection to syslog being in the dump, this was one of
> the reasons behind the new logging facilities at [1], which provide a
> clean installer-only log file.  We could add some checkboxes to choose
> which files to include, eg:
>
> [X] Installer log
> [ ] Syslog
> [ ] Dmesg
>
> Along with an option to view them in a pager.

Problem is that users, even advanced users, cannot necessarily tell what
sensitive info each of these might contain, nor whether withdrawing them
from the report would impede debugging.  So it’s probably a choice we
have to make ourselves.

Since the installer uses syslog, we could add a syslog rule that
redirects installer logging to a separate file.  We still need kernel
output to see info about devices, but perhaps that too could go to a
separate file?

Thanks,
Ludo’.




  parent reply	other threads:[~2022-01-11 14:36 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-12-29  9:16 [bug#52866] maintenance: Add a crash dump service Mathieu Othacehe
2021-12-29 17:37 ` zimoun
2022-01-05 21:13 ` Ludovic Courtès
2022-01-06  8:22   ` Mathieu Othacehe
2022-01-07 11:16     ` Josselin Poiret via Guix-patches via
2022-01-11 13:10     ` Ludovic Courtès [this message]
2022-02-02 16:33       ` bug#52866: " Mathieu Othacehe
2022-02-08  9:53         ` [bug#52866] " Ludovic Courtès

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://guix.gnu.org/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=875yqqv2n3.fsf@gnu.org \
    --to=ludo@gnu.org \
    --cc=52866@debbugs.gnu.org \
    --cc=othacehe@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).