On 19 March 2010 23:52, Lennart Poettering <mzerq...@0pointer.de> wrote:
> That is a security hole. Since /tmp knows no further access control an
> evil user can just create dirs there for each and every single user on
> the system. Those directories will then be owned by him, and all other
> users will a) either completely fail to work or b) happily connect to
> the evil user's services unless the software in question implements
> two-way credential passing and verification (which I'd bet akonadi
> doesn't do).
>
> So either this is a DoS vulnerability or an even worse security hole.
>
> So in short: don't do this. If you safely want to place a socket in
> /tmp, you need to place it in a random dir, and then symlink (or
> otherwise refer to it) from $HOME. Or better (as Colin suggested), just
> use D-Bus to pass around the randomized socket path. (or even better:
> use the new fd passing in D-Bus so that you don't need to socket path at
> all)
>
> Or even shorter: Unix sucks.
>
> At last year's FOSS.in I did a talk about issues like this in Unix and
> how to work around them in application and how incredibly hard it is to
> get this right. One of those days I hope to find the time to write a
> blog story about this.
>
> I personally believe introducing a per-user /var/run (maybe as
> /var/run/users/$USER which is created at login time) is cleanest way to
> fix all of this.
>
>> I can't imagine what harm that would cause to default under /tmp?
>
> It's a shared namespace. As such it is a major source of
> vulnerabitilities, especially if the developers didn't have this
> particular use in mind.

To what extent would the security issues associated with files in /tmp
be mitigated with a polyinstantiated /tmp directories? Should Fedora
move to that as a default?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to