| Summary: | file transfers break (mangle) secure/useful file permissions | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | eb <email.bug> |
| Component: | sftp | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | NEW --- | ||
| Severity: | normal | CC: | bryonak, eknagy, jjelen, redimido |
| Priority: | P5 | ||
| Version: | 8.4p1 | ||
| Hardware: | Other | ||
| OS: | Linux | ||
|
Description
eb
2021-01-14 22:11:28 AEDT
Concerning the relevance: As far as I know SFTP is the only remote filesystem (access) that is not able to transfer and create files with proper use of the umasked filepermissions in effect at their target location. The users are authenticated, but the files that SFTP creates on behalf of the users don't match the permissions that the files would get if the user's were to create them locally, or through any other network filesystem protocol. An example for a useful "custom rule" on a server as mentioned in 3b) is to force a umask (i.e. the -m option patch already shipped with fedora https://bugzilla.mindrot.org/show_bug.cgi?id=1844 ) Err, in my last comment it should of course read: "custom rule to force *permissions*" not umask. Other useful custom rules for a server that I could think of were to force an umask and/or to force minimal permissions for the files that the client can create. |