On Sat, Jul 30, 2016 at 05:53:10AM +0000, László Böszörményi (GCS) wrote:
> While this is a real issue, I somewhat agree with upstream. Being a
> system administrator for long time, I know as others should know:
> - don't run sensitive services on a machine which can be accessed by
> untrusted users,
> - even on your regular box set your $HOME to 0700 and your umask to 0077.
> In short, always expect the worst case and be prepared.

As a system administrator, I fully agree that systems should be setup
this way. You might want to consider posting this here[1] and here[2].

[1]: https://bugs.debian.org/398793
[2]: https://bugs.debian.org/782001

As a software engineer, I have to disagree here. You shouldn't assume
your software is running on locked-down environments only. If a file
might contain sensitive data, the file permissions should be set
accordingly, after all, they are setting file permissions correctly on
/var/lib/mongodb (even though they aren't setting them on
/var/log/mongodb either).

There are multiple use cases that might cause people to configure o+x
permissions on home folders and it's also what default debian sets for
home folders.

I don't think blaming users that aren't unix wizards is the right way to
deal with security, instead of having sane defaults towards security.
The worst case should be the exception instead of the norm.

If you run `ls -la ~/.*_history` most developers seem to agree with
this, given that permissions are set correctly regardless of the umask.

> > https://jira.mongodb.org/browse/SERVER-25335#comment-1342085
> >
> > The bug is locked, what do I do now?
>  You mean what to do with upstream? I guess nothing. Probably I can
> fix this myself.

Please go ahead.

This would resolve CVE-2016-6494 for the binary debian is distributing,
but there are still various downstreams for mongodb on debian and
MongoDB Inc themself that would ship without a patch.

Thanks.

Reply via email to