Date: Wed, 20 Nov 2019 16:34:37 +0100 From: Jan Behrens <jbe-mlist@magnetkern.de> To: Borja Marcos <borjam@sarenet.es> Cc: Mike Tancsa <mike@sentex.net>, Alan Somers <asomers@freebsd.org>, freebsd-fs <freebsd-fs@freebsd.org> Subject: Re: ZFS snapdir readability (Crosspost) Message-ID: <20191120163437.691abd369ab9c0a6d7d45ff2@magnetkern.de> In-Reply-To: <AEF4CA02-36B3-42FC-BE92-14DF0AF99540@sarenet.es> References: <20191107004635.c6d2e7d464d3d556a0d87465@magnetkern.de> <CAOtMX2huHZcXHH%2B=3Bx7hX_p9udJ2acOX%2BZL8vW=pjqbe6mOAA@mail.gmail.com> <e2eecef7-21b6-0ff2-b259-71421b7d097c@sentex.net> <9B22AD46-BE87-4305-9638-74D23AD4C8CA@sarenet.es> <cfcc12dd-e9eb-5a98-a031-ab18436a2dd3@sentex.net> <261FE331-EC5C-48C8-9249-9BCBF887CE38@sarenet.es> <913f7040-6e38-452d-6187-e17fae63b652@sentex.net> <20191120144041.7f916360dc0c69bf509c9bd1@magnetkern.de> <AEF4CA02-36B3-42FC-BE92-14DF0AF99540@sarenet.es>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 20 Nov 2019 16:02:14 +0100 Borja Marcos <borjam@sarenet.es> wrote: > > On 20 Nov 2019, at 14:40, Jan Behrens <jbe-mlist@magnetkern.de> wrote: > > > > On Wed, 20 Nov 2019 08:24:43 -0500 > > Mike Tancsa <mike@sentex.net> wrote: > > > >> Actually, thats all I am advocating for-- settings perms on the > >> accessibility of the snapshot. ie instead of the "invisibility" feature, > >> change it to an "inaccessible" feature. > >> > >> ---Mike > > > > This would solve the security problem, but only as long as snapshots are > > never mounted. Once they are mounted (unless you can specify the > > directory where they are mounted), unprivileged users could still > > access files they should not be allowed to access. > > > > A better solution would be to specify user, group, and modes > > (e.g. root:root 700) when mounting or auto-mounting snapshots. > > At least it’s a different problem. Mounting a snapshot *intentionally* could be > something similar to recovering a backup. What poses a serious issue in my > opinion is that the system *does* mount them automatically. > > Borja. > Security vulnerabilities during backup recovery (e.g. when recovering part of the backup but being forced to expose other data as well when mounting the system) are still security vulnerabilities. Of course limiting the security vulnerabilities to certain moments (partial backup recovery) is a nice step forward, but an even better solution would be to avoid security vulnerabilities at all times. The latter requires to either (a) never mount snapshots ever, or (b) only mount snapshots when they are to be *completely* restored, or (c) be able to specify the user, group, and mode (unless 700 by default) when mounting or auto-mounting the snapshots, or (d) be able to specify a mount point such that the mount point can be within a directory that is not +x for everyone. Regards, Jan
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20191120163437.691abd369ab9c0a6d7d45ff2>