* git pull aborts in 50% of cases @ 2005-12-02 19:04 Alexey Dobriyan 2005-12-02 18:58 ` H. Peter Anvin 0 siblings, 1 reply; 17+ messages in thread From: Alexey Dobriyan @ 2005-12-02 19:04 UTC (permalink / raw) To: git $ git pull Already up-to-date. $ git pull Already up-to-date. $ git pull Already up-to-date. $ git pull fatal: unexpected EOF Fetch failure: git://git.kernel.org/pub/scm/git/git.git $ git pull fatal: unexpected EOF Fetch failure: git://git.kernel.org/pub/scm/git/git.git $ git pull Already up-to-date. $ git pull fatal: unexpected EOF Fetch failure: git://git.kernel.org/pub/scm/git/git.git $ git pull fatal: unexpected EOF Fetch failure: git://git.kernel.org/pub/scm/git/git.git Ditto for "git fetch --tags". Can somebody explain what's going on? ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-02 19:04 git pull aborts in 50% of cases Alexey Dobriyan @ 2005-12-02 18:58 ` H. Peter Anvin 2005-12-02 21:12 ` Alexey Dobriyan 0 siblings, 1 reply; 17+ messages in thread From: H. Peter Anvin @ 2005-12-02 18:58 UTC (permalink / raw) To: Alexey Dobriyan; +Cc: git Alexey Dobriyan wrote: > $ git pull > Already up-to-date. > $ git pull > Already up-to-date. > $ git pull > Already up-to-date. > $ git pull > fatal: unexpected EOF > Fetch failure: git://git.kernel.org/pub/scm/git/git.git > $ git pull > fatal: unexpected EOF > Fetch failure: git://git.kernel.org/pub/scm/git/git.git > $ git pull > Already up-to-date. > $ git pull > fatal: unexpected EOF > Fetch failure: git://git.kernel.org/pub/scm/git/git.git > $ git pull > fatal: unexpected EOF > Fetch failure: git://git.kernel.org/pub/scm/git/git.git > > Ditto for "git fetch --tags". > > Can somebody explain what's going on? > Do you know which IP address is aborting? There are two servers behind git.kernel.org. -hpa ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-02 18:58 ` H. Peter Anvin @ 2005-12-02 21:12 ` Alexey Dobriyan 2005-12-02 21:02 ` H. Peter Anvin 0 siblings, 1 reply; 17+ messages in thread From: Alexey Dobriyan @ 2005-12-02 21:12 UTC (permalink / raw) To: H. Peter Anvin; +Cc: git On Fri, Dec 02, 2005 at 10:58:43AM -0800, H. Peter Anvin wrote: > Alexey Dobriyan wrote: > >$ git pull > >Already up-to-date. > >$ git pull > >Already up-to-date. > >$ git pull > >Already up-to-date. > >$ git pull > >fatal: unexpected EOF > >Fetch failure: git://git.kernel.org/pub/scm/git/git.git > >$ git pull > >fatal: unexpected EOF > >Fetch failure: git://git.kernel.org/pub/scm/git/git.git > >$ git pull > >Already up-to-date. > >$ git pull > >fatal: unexpected EOF > >Fetch failure: git://git.kernel.org/pub/scm/git/git.git > >$ git pull > >fatal: unexpected EOF > >Fetch failure: git://git.kernel.org/pub/scm/git/git.git > > > >Ditto for "git fetch --tags". > > > >Can somebody explain what's going on? > > > > Do you know which IP address is aborting? There are two servers behind > git.kernel.org. Heisenbug :-\. I'll send IP next time. ~/linux/linux-linus $ while true; do git pull; done Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. Already up-to-date. ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-02 21:12 ` Alexey Dobriyan @ 2005-12-02 21:02 ` H. Peter Anvin 2005-12-02 21:41 ` Junio C Hamano 2005-12-03 2:18 ` Johannes Schindelin 0 siblings, 2 replies; 17+ messages in thread From: H. Peter Anvin @ 2005-12-02 21:02 UTC (permalink / raw) To: Alexey Dobriyan; +Cc: git Alexey Dobriyan wrote: > > Heisenbug :-\. I'll send IP next time. > Actually, it turns out the two servers were running different versions; one 0.99.9j and one 0.99.9k. They're both running 0.99.9j now. 0.99.9k is clearly bad. -hpa ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-02 21:02 ` H. Peter Anvin @ 2005-12-02 21:41 ` Junio C Hamano 2005-12-03 2:18 ` Johannes Schindelin 1 sibling, 0 replies; 17+ messages in thread From: Junio C Hamano @ 2005-12-02 21:41 UTC (permalink / raw) To: git H. Peter Anvin <hpa <at> zytor.com> writes: > Actually, it turns out the two servers were running different versions; > one 0.99.9j and one 0.99.9k. They're both running 0.99.9j now. > > 0.99.9k is clearly bad. This is troublesome, since I do not think it is hitting the one that was causing trouble for the snapshotting procedure, and I cannot seem to reproduce it with random set of flags and parameters myself. I know you run it with --inetd, but what other parameters do you run it with, and in what kind of environment? Specifically: - do you use whitelist, like "git-daemon --inetd --export-all /pub/scm"? - if so, are any symlinks involved in /pub area? - if so, does adding real path like /mnt/real/pub/scm for /pub/scm help? - do you run with --strict-paths? ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-02 21:02 ` H. Peter Anvin 2005-12-02 21:41 ` Junio C Hamano @ 2005-12-03 2:18 ` Johannes Schindelin 2005-12-03 2:26 ` Junio C Hamano 1 sibling, 1 reply; 17+ messages in thread From: Johannes Schindelin @ 2005-12-03 2:18 UTC (permalink / raw) To: H. Peter Anvin; +Cc: Alexey Dobriyan, git Hi, On Fri, 2 Dec 2005, H. Peter Anvin wrote: > Alexey Dobriyan wrote: > > > > Heisenbug :-\. I'll send IP next time. > > > > Actually, it turns out the two servers were running different versions; one > 0.99.9j and one 0.99.9k. They're both running 0.99.9j now. > > 0.99.9k is clearly bad. Huh? It could be slower, and it could therefore hit the maximum client count faster, but it should not be bad. All changes to pull were done in a manner so as to be backward compatible. In both ways. Hth, Dscho ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-03 2:18 ` Johannes Schindelin @ 2005-12-03 2:26 ` Junio C Hamano 2005-12-03 4:22 ` H. Peter Anvin 0 siblings, 1 reply; 17+ messages in thread From: Junio C Hamano @ 2005-12-03 2:26 UTC (permalink / raw) To: Johannes Schindelin; +Cc: git, H. Peter Anvin Johannes Schindelin <Johannes.Schindelin@gmx.de> writes: >> 0.99.9k is clearly bad. > > Huh? It could be slower, and it could therefore hit the maximum client > count faster, but it should not be bad. > > All changes to pull were done in a manner so as to be backward compatible. > In both ways. I do not think the fetch-pack common computation changes is involved in this problem at all. What is suspect is the repository validity check code, specifically (quoting from diff between 0.99.9j and 0.99.9k daemon.c::path_ok() function): + /* The validation is done on the paths after enter_repo + * canonicalization, so whitelist should be written in + * terms of real pathnames (i.e. after ~user is expanded + * and symlinks resolved). + */ I suspect (but have not heard back from HPA to confirm) that kernel.org runs git-daemon with /pub/scm as the whitelist, but there is a symbolic link (or bind mount?) involved, and the real path checked based on getcwd() return value is somewhere else. ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-03 2:26 ` Junio C Hamano @ 2005-12-03 4:22 ` H. Peter Anvin 2005-12-03 9:45 ` Junio C Hamano 0 siblings, 1 reply; 17+ messages in thread From: H. Peter Anvin @ 2005-12-03 4:22 UTC (permalink / raw) To: Junio C Hamano; +Cc: Johannes Schindelin, git Junio C Hamano wrote: > Johannes Schindelin <Johannes.Schindelin@gmx.de> writes: > > >>>0.99.9k is clearly bad. >> >>Huh? It could be slower, and it could therefore hit the maximum client >>count faster, but it should not be bad. >> >>All changes to pull were done in a manner so as to be backward compatible. >>In both ways. > > > I do not think the fetch-pack common computation changes is > involved in this problem at all. > > What is suspect is the repository validity check code, > specifically (quoting from diff between 0.99.9j and 0.99.9k > daemon.c::path_ok() function): > > + /* The validation is done on the paths after enter_repo > + * canonicalization, so whitelist should be written in > + * terms of real pathnames (i.e. after ~user is expanded > + * and symlinks resolved). > + */ > > I suspect (but have not heard back from HPA to confirm) that > kernel.org runs git-daemon with /pub/scm as the whitelist, but > there is a symbolic link (or bind mount?) involved, and the real > path checked based on getcwd() return value is somewhere else. /pub is a symbolic link. We shouldn't rely on getcwd() for this kind of stuff; it's bad for a whole bunch of reasons. -hpa ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-03 4:22 ` H. Peter Anvin @ 2005-12-03 9:45 ` Junio C Hamano 2005-12-03 19:21 ` H. Peter Anvin 2005-12-03 19:30 ` [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) Junio C Hamano 0 siblings, 2 replies; 17+ messages in thread From: Junio C Hamano @ 2005-12-03 9:45 UTC (permalink / raw) To: H. Peter Anvin; +Cc: Johannes Schindelin, git "H. Peter Anvin" <hpa@zytor.com> writes: > /pub is a symbolic link. We shouldn't rely on getcwd() for this kind of > stuff; it's bad for a whole bunch of reasons. Well, if I recall correctly it was done this way because DWIMmery needs to be done before the validation. Anyway, here is a rewrite of tonight (I resurrected your "belts and suspenders paranoia patch" for this). Would appreciate it if people can try this out (in the proposed updates branch). The rules (in 0.99.9k and "master" so far) have been that if you have symlinked public, whitelist should say what the canonical names of them are (and the way canonical names are obtained were getcwd()). The rule of this patch is different: whitelist says what the remote requestor can ask for. So if your /pub is a symlink to /mnt/mnt1/pub, you do not have to say /mnt/mnt1/pub to export it. Instead you whitelist /pub (or /pub/scm). Also if your ~bob is /home1/bob and ~alice is /home2/alice, you do not say "/home1 /home2" -- instead, you say "~alice ~bob". -- >8 -- Subject: [PATCH] daemon.c and path.enter_repo(): revamp path validation. The whitelist of git-daemon is checked against return value from enter_repo(), and enter_repo() used to return the value obtained from getcwd() to avoid directory aliasing issues as discussed earier (mid October 2005). Unfortunately, it did not go well as we hoped. For example, /pub on a kernel.org public machine is a symlink to its real mountpoint, and it is understandable that the administrator does not want to adjust the whitelist every time /pub needs to point at a different partition for storage allcation or whatever reasons. Being able to keep using /pub/scm as the whitelist is a desirable property. So this version of enter_repo() reports what it used to chdir() and validate, but does not use getcwd() to canonicalize the directory name. When it sees a user relative path ~user/path, it internally resolves it to try chdir() there, but it still reports ~user/path (possibly after appending .git if allowed to do so, in which case it would report ~user/path.git). What this means is that if a whitelist wants to allow a user relative path, it needs to say "~" (for all users) or list user home directories like "~alice" "~bob". And no, you cannot say /home if the advertised way to access user home directories are ~alice,~bob, etc. The whole point of this is to avoid unnecessary aliasing issues. Anyway, because of this, daemon needs to do a bit more work to guard itself. Namely, it needs to make sure that the accessor does not try to exploit its leading path match rule by inserting /../ in the middle or hanging /.. at the end. I resurrected the belts and suspender paranoia code HPA did for this purpose. This check cannot be done in the enter_repo() unconditionally, because there are valid callers of enter_repo() that want to honor /../; authorized users coming over ssh to run send-pack and fetch-pack should be allowed to do so. Signed-off-by: Junio C Hamano <junkio@cox.net> --- daemon.c | 64 ++++++++++++++++++++++++-- path.c | 153 ++++++++++++++++++++++++++++++++++++++++---------------------- 2 files changed, 159 insertions(+), 58 deletions(-) 018c8d740d18b7fe7d9d5a24fc1d008e29d70bc4 diff --git a/daemon.c b/daemon.c index 91b9656..539f6e8 100644 --- a/daemon.c +++ b/daemon.c @@ -82,9 +82,63 @@ static void loginfo(const char *err, ... va_end(params); } +static int avoid_alias(char *p) +{ + int sl, ndot; + + /* + * This resurrects the belts and suspenders paranoia check by HPA + * done in <435560F7.4080006@zytor.com> thread, now enter_repo() + * does not do getcwd() based path canonicalizations. + * + * sl becomes true immediately after seeing '/' and continues to + * be true as long as dots continue after that without intervening + * non-dot character. + */ + if (!p || (*p != '/' && *p != '~')) + return -1; + sl = 1; ndot = 0; + p++; + + while (1) { + char ch = *p++; + if (sl) { + if (ch == '.') + ndot++; + else if (ch == '/') { + if (ndot < 3) + /* reject //, /./ and /../ */ + return -1; + ndot = 0; + } + else if (ch == 0) { + if (0 < ndot && ndot < 3) + /* reject /.$ and /..$ */ + return -1; + return 0; + } + else + sl = ndot = 0; + } + else if (ch == 0) + return 0; + else if (ch == '/') { + sl = 1; + ndot = 0; + } + } +} + static char *path_ok(char *dir) { - char *path = enter_repo(dir, strict_paths); + char *path; + + if (avoid_alias(dir)) { + logerror("'%s': aliased", dir); + return NULL; + } + + path = enter_repo(dir, strict_paths); if (!path) { logerror("'%s': unable to chdir or not a git archive", dir); @@ -96,9 +150,11 @@ static char *path_ok(char *dir) int pathlen = strlen(path); /* The validation is done on the paths after enter_repo - * canonicalization, so whitelist should be written in - * terms of real pathnames (i.e. after ~user is expanded - * and symlinks resolved). + * appends optional {.git,.git/.git} and friends, but + * it does not use getcwd(). So if your /pub is + * a symlink to /mnt/pub, you can whitelist /pub and + * do not have to say /mnt/pub. + * Do not say /pub/. */ for ( pp = ok_paths ; *pp ; pp++ ) { int len = strlen(*pp); diff --git a/path.c b/path.c index 2c077c0..334b2bd 100644 --- a/path.c +++ b/path.c @@ -131,76 +131,121 @@ int validate_symref(const char *path) return -1; } -static char *current_dir(void) +static char *user_path(char *buf, char *path, int sz) { - return getcwd(pathname, sizeof(pathname)); -} - -static int user_chdir(char *path) -{ - char *dir = path; + struct passwd *pw; + char *slash; + int len, baselen; - if(*dir == '~') { /* user-relative path */ - struct passwd *pw; - char *slash = strchr(dir, '/'); - - dir++; - /* '~/' and '~' (no slash) means users own home-dir */ - if(!*dir || *dir == '/') - pw = getpwuid(getuid()); - else { - if (slash) { - *slash = '\0'; - pw = getpwnam(dir); - *slash = '/'; - } - else - pw = getpwnam(dir); + if (!path || path[0] != '~') + return NULL; + path++; + slash = strchr(path, '/'); + if (path[0] == '/' || !path[0]) { + pw = getpwuid(getuid()); + } + else { + if (slash) { + *slash = 0; + pw = getpwnam(path); + *slash = '/'; } - - /* make sure we got something back that we can chdir() to */ - if(!pw || chdir(pw->pw_dir) < 0) - return -1; - - if(!slash || !slash[1]) /* no path following username */ - return 0; - - dir = slash + 1; + else + pw = getpwnam(path); } - - /* ~foo/path/to/repo is now path/to/repo and we're in foo's homedir */ - if(chdir(dir) < 0) - return -1; - - return 0; + if (!pw || !pw->pw_dir || sz <= strlen(pw->pw_dir)) + return NULL; + baselen = strlen(pw->pw_dir); + memcpy(buf, pw->pw_dir, baselen); + while ((1 < baselen) && (buf[baselen-1] == '/')) { + buf[baselen-1] = 0; + baselen--; + } + if (slash && slash[1]) { + len = strlen(slash); + if (sz <= baselen + len) + return NULL; + memcpy(buf + baselen, slash, len + 1); + } + return buf; } +/* + * First, one directory to try is determined by the following algorithm. + * + * (0) If "strict" is given, the path is used as given and no DWIM is + * done. Otherwise: + * (1) "~/path" to mean path under the running user's home directory; + * (2) "~user/path" to mean path under named user's home directory; + * (3) "relative/path" to mean cwd relative directory; or + * (4) "/absolute/path" to mean absolute directory. + * + * Unless "strict" is given, we try access() for existence of "%s.git/.git", + * "%s/.git", "%s.git", "%s" in this order. The first one that exists is + * what we try. + * + * Second, we try chdir() to that. Upon failure, we return NULL. + * + * Then, we try if the current directory is a valid git repository. + * Upon failure, we return NULL. + * + * If all goes well, we return the directory we used to chdir() (but + * before ~user is expanded), avoiding getcwd() resolving symbolic + * links. User relative paths are also returned as they are given, + * except DWIM suffixing. + */ char *enter_repo(char *path, int strict) { - if(!path) + static char used_path[PATH_MAX]; + static char validated_path[PATH_MAX]; + + if (!path) return NULL; - if (strict) { - if (chdir(path) < 0) + if (!strict) { + static const char *suffix[] = { + ".git/.git", "/.git", ".git", "", NULL, + }; + int len = strlen(path); + int i; + while ((1 < len) && (path[len-1] == '/')) { + path[len-1] = 0; + len--; + } + if (PATH_MAX <= len) return NULL; - } - else { - if (!*path) - ; /* happy -- no chdir */ - else if (!user_chdir(path)) - ; /* happy -- as given */ - else if (!user_chdir(mkpath("%s.git", path))) - ; /* happy -- uemacs --> uemacs.git */ - else + if (path[0] == '~') { + if (!user_path(used_path, path, PATH_MAX)) + return NULL; + strcpy(validated_path, path); + path = used_path; + } + else if (PATH_MAX - 10 < len) return NULL; - (void)chdir(".git"); + else { + path = strcpy(used_path, path); + strcpy(validated_path, path); + } + len = strlen(path); + for (i = 0; suffix[i]; i++) { + strcpy(path + len, suffix[i]); + if (!access(path, F_OK)) { + strcat(validated_path, suffix[i]); + break; + } + } + if (!suffix[i] || chdir(path)) + return NULL; + path = validated_path; } + else if (chdir(path)) + return NULL; - if(access("objects", X_OK) == 0 && access("refs", X_OK) == 0 && - validate_symref("HEAD") == 0) { + if (access("objects", X_OK) == 0 && access("refs", X_OK) == 0 && + validate_symref("HEAD") == 0) { putenv("GIT_DIR=."); check_repository_format(); - return current_dir(); + return path; } return NULL; -- 0.99.9.GIT ^ permalink raw reply related [flat|nested] 17+ messages in thread
* Re: git pull aborts in 50% of cases 2005-12-03 9:45 ` Junio C Hamano @ 2005-12-03 19:21 ` H. Peter Anvin 2005-12-03 19:30 ` [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) Junio C Hamano 1 sibling, 0 replies; 17+ messages in thread From: H. Peter Anvin @ 2005-12-03 19:21 UTC (permalink / raw) To: Junio C Hamano; +Cc: Johannes Schindelin, git Junio C Hamano wrote: > "H. Peter Anvin" <hpa@zytor.com> writes: > > >>/pub is a symbolic link. We shouldn't rely on getcwd() for this kind of >>stuff; it's bad for a whole bunch of reasons. > > > Well, if I recall correctly it was done this way because > DWIMmery needs to be done before the validation. > > Anyway, here is a rewrite of tonight (I resurrected your "belts > and suspenders paranoia patch" for this). Would appreciate it > if people can try this out (in the proposed updates branch). > > The rules (in 0.99.9k and "master" so far) have been that if you > have symlinked public, whitelist should say what the canonical > names of them are (and the way canonical names are obtained were > getcwd()). The rule of this patch is different: whitelist says > what the remote requestor can ask for. So if your /pub is a > symlink to /mnt/mnt1/pub, you do not have to say /mnt/mnt1/pub > to export it. Instead you whitelist /pub (or /pub/scm). Also > if your ~bob is /home1/bob and ~alice is /home2/alice, you do > not say "/home1 /home2" -- instead, you say "~alice ~bob". > Yup, this is the way to do it. Forcing people to use canonical names is quite a nonstarter. -hpa ^ permalink raw reply [flat|nested] 17+ messages in thread
* [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) 2005-12-03 9:45 ` Junio C Hamano 2005-12-03 19:21 ` H. Peter Anvin @ 2005-12-03 19:30 ` Junio C Hamano 2005-12-03 19:41 ` H. Peter Anvin 1 sibling, 1 reply; 17+ messages in thread From: Junio C Hamano @ 2005-12-03 19:30 UTC (permalink / raw) To: H. Peter Anvin; +Cc: Johannes Schindelin, git Having slept over the patch I am responding to, I tend to think this is more trouble than its worth. Validating the directory enter_repo() chdir()'ed into and validated to be a good git repository should be done on its canonical name as getcwd() returns, not with a userland aliasing avoidance. As an administrator, being able to say /pub/scm on the whitelist, knowing /pub to be a symbolic link points at somewhere today but maybe at different place tomorrow, and not having to adjust the whitelist whenever that happens, is indeed nice. We do not allow the remote requestor to say /../ in the path, so we trap him within the directories the whitelist describes. Not. For example, I can by mistake create a symbolic link: ln -s /home /pub/scm/git/git.git/oops now accesses /pub/scm/git/oops/hpa/secret.git/ is not restricted. We could hand-resolve the each level from the request to see if no "funny" symbolic links are involved, but what is the definition of "funny"? When we see /pub pointing at somewhere in /mnt/disk47/slice31, we should not complain. When we see "oops" under git in the above example, we would want to complain. These things are hard to get right. I tend to say that the 0.99.9k (and the current master) rule to make validation always work on what getcwd() gives back is easier to understand (which generally means safer). Can I talk you into adjusting your whitelist on kernel.org machines? ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) 2005-12-03 19:30 ` [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) Junio C Hamano @ 2005-12-03 19:41 ` H. Peter Anvin 2005-12-03 19:56 ` Linus Torvalds 2005-12-03 20:20 ` Junio C Hamano 0 siblings, 2 replies; 17+ messages in thread From: H. Peter Anvin @ 2005-12-03 19:41 UTC (permalink / raw) To: Junio C Hamano; +Cc: Johannes Schindelin, git Junio C Hamano wrote: > > For example, I can by mistake create a symbolic link: > > ln -s /home /pub/scm/git/git.git/oops > > now accesses /pub/scm/git/oops/hpa/secret.git/ is not > restricted. We could hand-resolve the each level from the > request to see if no "funny" symbolic links are involved, but > what is the definition of "funny"? When we see /pub pointing at > somewhere in /mnt/disk47/slice31, we should not complain. When > we see "oops" under git in the above example, we would want to > complain. These things are hard to get right. > Actually, it's a policy decision whether or not symlinks should be allowed to exit space like that; in Apache, for example, it's a configurable. > I tend to say that the 0.99.9k (and the current master) rule to > make validation always work on what getcwd() gives back is > easier to understand (which generally means safer). Can I talk > you into adjusting your whitelist on kernel.org machines? I'm not happy about it, but it's not a huge deal on kernel.org. However, I think it's the wrong thing, especially in the light of allowing user-relative paths. At the very least, if you insist on using getcwd() names, you should pre-canonicalize the whitelist, too. -hpa ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) 2005-12-03 19:41 ` H. Peter Anvin @ 2005-12-03 19:56 ` Linus Torvalds 2005-12-03 21:19 ` Junio C Hamano 2005-12-03 20:20 ` Junio C Hamano 1 sibling, 1 reply; 17+ messages in thread From: Linus Torvalds @ 2005-12-03 19:56 UTC (permalink / raw) To: H. Peter Anvin; +Cc: Junio C Hamano, Johannes Schindelin, git On Sat, 3 Dec 2005, H. Peter Anvin wrote: > > At the very least, if you insist on using getcwd() names, you should > pre-canonicalize the whitelist, too. That would probably solve the problem and sounds like the right user-friendly solution. Linus ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) 2005-12-03 19:56 ` Linus Torvalds @ 2005-12-03 21:19 ` Junio C Hamano 2005-12-03 21:28 ` Junio C Hamano 0 siblings, 1 reply; 17+ messages in thread From: Junio C Hamano @ 2005-12-03 21:19 UTC (permalink / raw) To: H. Peter Anvin; +Cc: Linus Torvalds, Johannes Schindelin, git Linus Torvalds <torvalds@osdl.org> writes: > On Sat, 3 Dec 2005, H. Peter Anvin wrote: >> >> At the very least, if you insist on using getcwd() names, you should >> pre-canonicalize the whitelist, too. > > That would probably solve the problem and sounds like the right > user-friendly solution. I agree with you that limiting with names exposed to the end-user is the right approach and we should avoid having administrators to use getcwd() names. So in that sense, I think the patch I sent earlier is going in the right direction. To cope with the "oops" symlink problem, we could introduce "--strict-symlink" flag to daemon that does these things: - enter_repo() returns three things: "~alice/foo.git/.git", "/home/alice/foo.git/.git", and "/home/alice"; the first is what remote requested with DWIM, the second is where it chdir()ed, and the third is what it expanded the user-relative base to. None of them uses getcwd(). When user-relative path is not involved, the first two are the same, and the last one is undefined (and not used). - daemon checks the whitelist with the first one, and if the path is not allowed, the processing stops there with failure. Without --strict-symlink, this is the only test done with whitelist. This means the whitelist should have /pub/scm and ~alice, not /mnt/disk47/slice31/scm nor /home2/alice. With --strict-symlink, it uses the latter two with the whitelist entry it matched, to determine where to start further "strict symlink check". The part that matched the whitelist is OK and the rest is checked [*1*]: - If "~alice" was whitelisted, it knows ~alice expanded to /home/alice, and starts checking from /home/alice/foo.git and then checks /home/alice/foo.git/.git. - If "~alice/foo.git" was whitelisted, it knows it expands to /home/alice/foo.git, and checks /home/alice/foo.git/.git. - If a whitelist entry "/pub/scm" was matched against a request "/pub/scm/git/git.git", it checks /pub/scm/git and /pub/scm/git.git The strict symlink check tries to readlink() each of what are to be checked by the above logic, and rejects if it was found to be a symlink that starts with a "/" (i.e. absolute pathname) or anything that has undesiable aliasing effect; "belts and suspender paranoia" in daemon.c::avoid_alias(), which is stricter than needed but is safe is a good starting point, but we may want to allow things that do not step outside the prefix we matched. However, I am not ready to do all of the above, not just yet. Since I wanted to do another maintenance update this weekend, I'd throw in the last-night's patch in the master so that at least 0.99.9l works with /pub whitelist, knowing the "oops" symlink issue is still to be solved. That way we can keep the users' configuration the same when later we introduce all of the above. Thoughts? [Footnote] *1* If we later introduce "/pub/scm/**/*.git", we allow symlinks in the first directories without glob patterns, i.e. "/pub/scm", so this is somewhat future-proof. ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) 2005-12-03 21:19 ` Junio C Hamano @ 2005-12-03 21:28 ` Junio C Hamano 0 siblings, 0 replies; 17+ messages in thread From: Junio C Hamano @ 2005-12-03 21:28 UTC (permalink / raw) To: git Junio C Hamano <junkio@cox.net> writes: Trivial typo. > - If a whitelist entry "/pub/scm" was matched against a > request "/pub/scm/git/git.git", it checks /pub/scm/git and > /pub/scm/git.git Obviously "/pub/scm/git" and "/pub/scm/git/git.git" are the ones that are checked here. Whitelist "/pub/scm" means "/pub/scm and under, and the administrator knows /pub or /pub/scm may be symlinks pointing at places he wants them to, so do not check and complain where they point at". ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) 2005-12-03 19:41 ` H. Peter Anvin 2005-12-03 19:56 ` Linus Torvalds @ 2005-12-03 20:20 ` Junio C Hamano 2005-12-03 20:45 ` H. Peter Anvin 1 sibling, 1 reply; 17+ messages in thread From: Junio C Hamano @ 2005-12-03 20:20 UTC (permalink / raw) To: git "H. Peter Anvin" <hpa@zytor.com> writes: > At the very least, if you insist on using getcwd() names, you should > pre-canonicalize the whitelist, too. With the current "prefix" rule (and not allowing /ho to match /home) that sounds possible and sensivle, but that is not nice in the long run. We may later want to say "/pub/git/**/*.git" for example to mean "any subdirectory under /pub/git but the base directory name must be something ending with '.git'". Hmm... ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) 2005-12-03 20:20 ` Junio C Hamano @ 2005-12-03 20:45 ` H. Peter Anvin 0 siblings, 0 replies; 17+ messages in thread From: H. Peter Anvin @ 2005-12-03 20:45 UTC (permalink / raw) To: Junio C Hamano; +Cc: git Junio C Hamano wrote: > "H. Peter Anvin" <hpa@zytor.com> writes: > >>At the very least, if you insist on using getcwd() names, you should >>pre-canonicalize the whitelist, too. > > With the current "prefix" rule (and not allowing /ho to match > /home) that sounds possible and sensivle, but that is not nice > in the long run. We may later want to say "/pub/git/**/*.git" > for example to mean "any subdirectory under /pub/git but the > base directory name must be something ending with '.git'". > > Hmm... > Yep, this stuff is hard. For example, on kernel.org I'm not concerned about symbolic links; the likelihood of an accidental symbolic link that would violate security is very small. Other applications might be different. Arguably, the correct interface is to modularize it, and have both the user request, the post-DWIM output, and the -hpa ^ permalink raw reply [flat|nested] 17+ messages in thread
end of thread, other threads:[~2005-12-03 21:28 UTC | newest] Thread overview: 17+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2005-12-02 19:04 git pull aborts in 50% of cases Alexey Dobriyan 2005-12-02 18:58 ` H. Peter Anvin 2005-12-02 21:12 ` Alexey Dobriyan 2005-12-02 21:02 ` H. Peter Anvin 2005-12-02 21:41 ` Junio C Hamano 2005-12-03 2:18 ` Johannes Schindelin 2005-12-03 2:26 ` Junio C Hamano 2005-12-03 4:22 ` H. Peter Anvin 2005-12-03 9:45 ` Junio C Hamano 2005-12-03 19:21 ` H. Peter Anvin 2005-12-03 19:30 ` [RFC] daemon whitelist handling (Re: git pull aborts in 50% of cases) Junio C Hamano 2005-12-03 19:41 ` H. Peter Anvin 2005-12-03 19:56 ` Linus Torvalds 2005-12-03 21:19 ` Junio C Hamano 2005-12-03 21:28 ` Junio C Hamano 2005-12-03 20:20 ` Junio C Hamano 2005-12-03 20:45 ` H. Peter Anvin
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).