On Thursday 29 August 2013 11:46 PM, Wayne Davison wrote:
On Tue, Aug 27, 2013 at 8:03 PM, Sherin A <sherin...@gmail.com <mailto:sherin...@gmail.com>> wrote:

    Hope they will report it as a  vulnerability , because this POC
    has been exploited successfully  and it is affected by all
    software that  use rsync as a backup  and restore  tool.


This is totally false. The vulnerability is your insecure use of chown, so you are shooting yourself in the foot. You could accomplish the same bad sequence of copying/restoring using any backup tool.

If you want to use a non-root backup store, just use --fake-super on the remote side, as previously mentioned (and ensure that xattrs are enabled there).

..wayne..
So you are saying the chown is insecure . So as per your suggestion , I need to read each and every file of the user and do the chown of only required files ? Well I think it may take a little more time to check one million files of a user :( . Fake user won't work in push backups.

--
--------------------------------------
Regards
Sherin A
http://www.sherin.co.in/

-- 
Please use reply-all for most replies to avoid omitting the mailing list.
To unsubscribe or change options: https://lists.samba.org/mailman/listinfo/rsync
Before posting, read: http://www.catb.org/~esr/faqs/smart-questions.html

Reply via email to