(also, once again, sticky bit)

-- 
Raul

On Tuesday, June 13, 2017, Raul Miller <rauldmil...@gmail.com> wrote:

> Worse, though, is if you think that a security issue on a file server
> is because of a problem in the default client configuration.
>
> Mind you, this is not completely general (load issues and integrity
> issues do matter on the client side), but when we're talking about
> granting of permissions on those files it's about as wrong as you can
> get.
>
> --
> Raul
>
>
> On Tue, Jun 13, 2017 at 1:47 AM, Otto Moerbeek <o...@drijf.net
> <javascript:;>> wrote:
> > On Tue, Jun 13, 2017 at 01:24:19AM -0400, Rupert Gallagher wrote:
> >
> >> If a non-root user can delete a root owned file with read-only
> permissions, then there is a security problem. Good luck to you if you are
> thinking otherwise.
> >
> > This is not how unix permissions work. The directory permissions
> > detemine if you can remove a file.
> >
> > If you expect otherwise, you should adapt your expectations.
> >
> >         -Otto
> >
> >>
> >> The windows nfs umask solves the problem of writing files to both user
> and group. It certainly does not solve the above security problem.
> >>
> >> Sent from ProtonMail Mobile
> >>
> >> On Mon, Jun 12, 2017 at 10:27 PM, Raul Miller <rauldmil...@gmail.com
> <javascript:;>> wrote: You have a very odd idea of "security". Probably
> though, this is the
> >> wrong mailing list for what you are trying to do.
> >>
> >> Good luck,
> >>
> >> --
> >> Raul
> >>
> >> On Mon, Jun 12, 2017 at 2:27 PM, Rupert Gallagher <r...@protonmail.com
> <javascript:;>> wrote:
> >> > I think the problem is how windows mounts the nfs folder by default
> (right click on "this computer" then select to attach a network folder to a
> drive letter). The following article by Microsoft describes the mount
> option "fileaccess" to set a default umask:
> >> >
> >> > https://technet.microsoft.com/en-us/library/cc754350(v=ws.11).aspx
> >> >
> >> > This option is not available from the default menu.
> >> >
> >> > Sent from ProtonMail Mobile
> >> >
> >> > On Mon, Jun 12, 2017 at 7:24 PM, Raul Miller <rauldmil...@gmail.com
> <javascript:;>> wrote: p.s. if you do not want windows files in that
> shared directory to be
> >> > executable, I think you can mount the nfs backing store partition
> >> > noexec.
> >> >
> >> > I haven't tested this, though - I mostly try to avoid networked file
> systems.
> >> >
> >> > Thanks,
> >> >
> >> > --
> >> > Raul
> >> >
> >> > On Mon, Jun 12, 2017 at 1:22 PM, Raul Miller <rauldmil...@gmail.com
> <javascript:;>> wrote:
> >> >> Ok, look...
> >> >>
> >> >> Your problem 1: all windows files are executable because the windows
> >> >> model for executable or not is proprietary and not supportable. It's
> >> >> also not clear why you should care about this in a shared directory.
> >> >>
> >> >> Your problem 2: if we assume that a shared directory (rather than
> user
> >> >> specific directories) is the right approach, and if we also assume
> >> >> that each user's claim to a file name should deny write access to
> >> >> other users with that file name, we need to look at the permissions
> on
> >> >> the containing directory.
> >> >>
> >> >> In your case, you have drwxrwxr-x -- this means that everyone who is
> a
> >> >> member of the staff directory has the right to remove directory
> >> >> entries. If you do not want that, you need to change the permissions
> >> >> on the directory: http://man.openbsd.org/sticky.8
> >> >>
> >> >> But, note that if you are changing the owner on the files to not
> match
> >> >> that of the user who created the files, you should expect that people
> >> >> will not be able to delete files that they themselves created.
> >> >>
> >> >> Your problem 3: this is a consequence of your having changed the
> owner
> >> >> of the file. Your file permissions say that only the owner can change
> >> >> the file.
> >> >>
> >> >> With this in mind, I think I can see how I would change things to
> >> >> match what you seem to be claiming that you want:
> >> >>
> >> >> (1) remove the user id mapping
> >> >>
> >> >> (2) set the sticky bit on the Shared directory.
> >> >>
> >> >> If you do not want this, I think you need to spend a little time
> >> >> thinking about what it is that you actually want, and whether or not
> >> >> that should even be possible.
> >> >>
> >> >> (So far, you have only mentioned an example uid value for a user as
> >> >> perhaps being an issue. This, combined with the subject line in this
> >> >> thread are the only clues I have as to why you might not have removed
> >> >> the user id mapping. But why this should even be an issue for you is
> >> >> unclear to me.)
> >> >>
> >> >> Thanks,
> >> >>
> >> >> --
> >> >> Raul
> >> >>
> >> >>
> >> >> On Mon, Jun 12, 2017 at 12:58 PM, Rupert Gallagher <
> r...@protonmail.com <javascript:;>> wrote:
> >> >>> On problem 2,
> >> >>>
> >> >>> if a user has group write permission on a folder, it has permission
> to write its own files and those of same group membership in that folder,
> provided the group permission is set on the file by its owner. If a file
> belongs to me and I deny write permission to group and other, then nobody
> can write my file. File creation and destruction are forms of writing. This
> is what I am used to see. The ability of a windows nfs user to delete a
> file for which it has no write permission is a security
> >
>

Reply via email to