[whatwg] whatwg Digest, Vol 82, Issue 10

Roger Hågensen rescator at emsai.net
Wed Jan 5 08:18:47 PST 2011


On 2011-01-05 01:07, Seth Brown wrote:
> I couldn't agree more that we should avoid turning this into vista's UAC.

The issue with UAC is not UAC.
UAC (especially the more dilligent one on Vista) merely exposed 
programmers and software expecting raised priviledges while they 
actually did not need them.
Linux has had "UAC" pretty much from day one so programmers and software 
has played nice from day one.
And UAC is not really security as it does not protect the user, UAC is 
intended to ensure that a user session won't fuck up anything else like 
other accounts or admin sessions or the OS/kernel.
UAC protects the system from potentially rogue user accounts.
So it's a shame that UAC's introduction in Vista brought such a stigma 
upon it as I actually like it.

Myself I have a fully separate normal user account (rather than the 
split token one that most here probably uses) so I actually have to 
enter the admin password each time,
but I do not find it annoying, and I actually develop under this normal 
user account.
only system updates or admin stuff need approval, and the odd software 
(but I try to avoid those instead).
Running software or installing software need to bring up any UAC at all, 
if it does it is simply lazy coding by the developers,
and any webapp stuff should also follow the same example in this case.

UAC is meant to help isolate an incident and prevent other parts of a 
system from being affected, or other users/accounts,
so a webapp should be secured under those same principles.
Considering all the issues with cross site exploits and so on it's 
obvious that the net is in dire need of some of those core principles,
so please do not so easily dismiss UAC due to how it's perceived, but 
rather judge it by what it actually is instead.


-- 
Roger "Rescator" Hågensen.
Freelancer - http://www.EmSai.net/




More information about the whatwg mailing list