From: | Robert Haas <robertmhaas(at)gmail(dot)com> |
---|---|
To: | Andres Freund <andres(at)2ndquadrant(dot)com> |
Cc: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Stephen Frost <sfrost(at)snowman(dot)net>, Adam Brightwell <adam(dot)brightwell(at)crunchydatasolutions(dot)com>, Peter Eisentraut <peter_e(at)gmx(dot)net>, PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Directory/File Access Permissions for COPY and Generic File Access Functions |
Date: | 2014-10-29 15:13:43 |
Message-ID: | CA+TgmoY8p2w1qVXwkM3yO0Cdj7uES6b_iWYiOBLTFepTwCJ9iw@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Wed, Oct 29, 2014 at 10:52 AM, Andres Freund <andres(at)2ndquadrant(dot)com> wrote:
>> The larger point though is that this is just one of innumerable attack
>> routes for anyone with the ability to make the server do filesystem reads
>> or writes of his choosing. If you think that's something you can safely
>> give to people you don't trust enough to make them superusers, you are
>> wrong, and I don't particularly want to spend the next ten years trying
>> to wrap band-aids around your misjudgment.
>
> ... but that doesn't necessarily address this point.
I think the question is "just how innumerable are those attack
routes"? So, we can prevent a symlink from being used via O_NOFOLLOW.
But what about hard links?
In general, the hazard is that an untrusted user can induce the user
to read or write a file that the user in question could not have read
or written himself. It's not clear to me whether it's reasonably
possible to build a system that is robust against such attacks, or
not.
--
Robert Haas
EnterpriseDB: http://www.enterprisedb.com
The Enterprise PostgreSQL Company
From | Date | Subject | |
---|---|---|---|
Next Message | Stephen Frost | 2014-10-29 15:19:40 | Re: Directory/File Access Permissions for COPY and Generic File Access Functions |
Previous Message | Andres Freund | 2014-10-29 14:52:06 | Re: Directory/File Access Permissions for COPY and Generic File Access Functions |