Aw: Re: acl/directory security question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



yes, correct - that is a valid objection!

in my setup, there will be no local users on that server and the remote-users typically will use their own box...

regards
roland


> Gesendet: Mittwoch, 29. Juli 2015 um 12:22 Uhr
> Von: "Anton Altaparmakov" <anton@xxxxxxxxxx>
> An: "devzero@xxxxxx" <devzero@xxxxxx>
> Cc: "linux-fsdevel@xxxxxxxxxxxxxxx" <linux-fsdevel@xxxxxxxxxxxxxxx>
> Betreff: Re: acl/directory security question
>
> Hi,
> 
> This is not safe at all because imagine for example user A copying a file from/to the hidden directory like so:
> 
> $ scp /your/hidden/dir/some/file somewhere/else
> 
> And user B at same time doing:
> 
> $ ps ax
> 
> The ps ax output will show the scp command including the full paths above thus your secret directory was just revealed to user B even though only user A was meant to know about it...
> 
> Best regards,
> 
> 	Anton
> 
> > On 20 Jul 2015, at 15:20, devzero@xxxxxx wrote:
> > 
> > hi, 
> > 
> > please forgive if this is a little bit offtopic here or sounds dumb...
> > 
> > i`d like to implement a file-sharing solution for an internal lan and 
> > consider sharing a directory via different protocols/daemons and place 
> > "secret" subdirs inside.
> > 
> > let`s say, i chmod the parent directory to 711 (rwx--x--x), any non-root
> > user get`s "permission denied" when trying to list the subdir`s contents. 
> > anyway, he will be able to access the contents of a secret subdir if 
> > that subdir is at leaast readable for him and he knows the subir`s name.
> > (examples see below)
> > 
> > can such a method of hiding subdirs and creating names which cannot be 
> > guessed considered to be a safe method, or is there some way to bypass
> > this sort of protection ? (despite software/kernel bugs, brute-force or 
> > admin error like setting wrong acl)
> > 
> > is there some "list the content`s of the first, second, third dir" or
> > "list directory contents by inode"-syscall ?
> > 
> > as nobody of the linux people i asked could answer this barely sufficient 
> > to me, i`d like to ask some people who really may know about... (as you`re
> > into acl, vfs, syscalls and that stuff)
> > 
> > thanks
> > roland
> > 
> > 
> > 
> > 
> > root@linux:/daten# ls -al
> > total 100856
> > drwxr-xr-x   7 root root      4096 Jul 17 13:55 .
> > drwxr-xr-x  23 root root      4096 Jul 30  2014 ..
> > drwx------   2 root root      4096 Feb  2 16:53 lost+found
> > drwx--x--x   4 root root      4096 Jul 17 12:35 sharedir
> > 
> > root@linux:/daten# ls -la sharedir/
> > total 20
> > drwx--x--x  4 root root 4096 Jul 17 12:35 .
> > drwxr-xr-x  7 root root 4096 Jul 17 13:55 ..
> > drwxrwxrwx 11 root root 4096 Jul 20 12:28 DUrXd3PgdGgj5th9
> > 
> > root@linux:/daten# su - roland
> > 
> > roland@linux:~$ cd /daten/
> > roland@linux:/daten$ ls -la sharedir
> > ls: cannot open directory sharedir: Permission denied
> > 
> > roland@linux:/daten$ ls -la sharedir/*
> > ls: cannot access sharedir/*: No such file or directory
> > 
> > roland@linux:/daten/sharedir$ find .
> > .
> > find: `.': Permission denied
> > 
> > roland@linux:/daten/sharedir$ tree --inodes -f -F
> > . [error opening dir]
> > 
> > 0 directories, 0 files
> > 
> > 
> > roland@linux:/daten$ ls -la sharedir/DUrXd3PgdGgj5th9
> > total 48
> > drwxrwxrwx 11 root     root     4096 Jul 20 12:28 .
> > drwx--x--x  4 root     root     4096 Jul 17 12:35 ..
> > drwxr-xr-x  2 public   public   4096 Jul 17 14:16 .DAV
> > drwx------  2 public   public   4096 Jul 20 12:15 New Folder
> > -rwxrwxrwx  1 public   public      0 Jul 17 14:18 test
> -- 
> Anton Altaparmakov <anton at tuxera.com> (replace at with @)
> Lead in File System Development, Tuxera Inc., http://www.tuxera.com/
> Linux NTFS maintainer
> 
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux