Dan Stromberg originally raised this issue on the rsync mailing list,
but it seemed to be more of an NFS issue than an rsync one.
Basically, his situation is that he's was using rsync to update
software on a machine whose filesystem is NFS-mounted. Some of those
updates might be security fixes, and in particular installation of new
versions of setuid/setgid programs, or deletion of setuid programs.
If any of the files being replaced/removed are in use at the time, the
client will create a .nfs* sillyrename file on the server. I think
this will happen regardless of what tool is used for the update:
rsync, "make install", dpkg, rpm, ...
The problem from the administrator's point of view is that the old
vulnerable program is still accessible under the .nfs* name, at least
while the text is still in use. If the client's abruptly
disconnected, then the sillyrename file could persist indefinitely, so
possibly somebody could exploit the security problem hours or days
after the administrator thought they'd updated the program.
I'm not sure what fix, if any, would be appropriate.
One possibility would be for nfs_sillyrename to mask off the
setuid/setgid bits both locally and remotely if it moves the file, by
doing a SETATTR as well as RENAME. That would fix this particular
problem, but at the cost of confusing anyone who does an fstat() on
the open file, etc. You might well think it's too kludgy too.
I advised Dan to run rsync directly to the server, which works for
him, but will not work for some people because they're using e.g.
NetApp (which doesn't run rsync), or something non-Linux (so they
can't run dpkg, etc).
rsync could remove the setuid bits before replacing the file, but
that's only fixes this one tool, is perhaps even more kludgy, and
leaves a window where the program being updated is just broken.
(e.g. non-setuid passwd.)
You might also argue that the administrator should just make sure the
file is not in use; or that they should sweep for .nfs files straight
afterwards.
On the whole I think nfs_sillyrename should mask it, but I'd
completely understand if people disagreed.
-- Martin (please cc me on replies) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/