Patch: disable path sanitization for modules rooted at "/"

2022-09-07 Thread Thor Simon via rsync
When running in daemon mode with a module rooted at "/", it is not possible to "escape" the module. Not by prefixing a link target with "../../../../../../..". Not by prefixing a link target with "/" nor "". So it seems to me that path sanitization is not useful in this case. And it breaks

RE: Patch: disable path sanitization for modules rooted at "/"

2022-09-20 Thread Thor Simon via rsync
Indeed, we have “use chroot = false” – our application is a file distribution system where users authenticate as themselves and run rsync daemonized over ssh transport, rrsync-style. We can’t run with “use chroot = true” as a workaround since the users are not root, and the chroot() system call