[Pkg-samba-maint] Bug#612764: I see the point they are looking for, the solution seems too limiting

Santiago Garcia Mantinan manty at debian.org
Tue Feb 15 00:04:25 UTC 2011


> > > The point is that if Unix extensions are enabled on the server, you can
> > > trigger an attack by making two connections with a client to get access to
> > > arbritrary files on the filesystem.  First you connect with unix extensions
> > > enabled on the client and create a symlink to your target file; then you
> > > connect with unix extensions /disabled/ to trick the server into reading you
> > > the contents of that file.
> 
> > In this case then we could allow wide links if the share is read only, for
> > example (this would be my case), without having triggering any extra
> > security problems.
> 
> Well, that's not a policy that Samba upstream can rely on.  read access to
> /etc/passwd could still be considered a problem in a read-only context.

I guess I didn't make myself clear here, let's go to your statement of the
two connections, furst with unix extensions on to create a symlink, if the
share is read only, there is no way to create the symlink, so no way to get
that read access to /etc/passwd, that's why I say that there would be no
extra security problems enabling wide links with unix extensions enabled on
a read only share.

The only problem I see here is that a local user can make the symlink and
then somebody without unix extensions can get read access to the file, but
this happens also if you use wide links without unix extensions enabled, so
this is happening with current implementation already.

BTW: when you have a pointer to upstream's bug, ticket or whatever, can you
share it here so that I can follow discussion? Thanks.

Regards...
-- 
Manty/BestiaTester -> http://manty.net





More information about the Pkg-samba-maint mailing list