Zsh Mailing List Archive
Messages sorted by:
Reverse Date,
Date,
Thread,
Author
Re: [PATCH] replacement for mktemp and mkstemp code in Src/utils.c
- X-seq: zsh-workers 44241
- From: Mikael Magnusson <mikachu@xxxxxxxxx>
- To: Clinton Bunch <cdb_zshl@xxxxxxxxxxx>
- Subject: Re: [PATCH] replacement for mktemp and mkstemp code in Src/utils.c
- Date: Sun, 21 Apr 2019 22:08:16 +0200
- Cc: zsh-workers@xxxxxxx
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=c3Mcgx+PpF+CkTHEKiJaOPSaF5KT7NhYKWgg/tye1lo=; b=CpCjlS5smOIOfGSVfMLe1giFRZD6Po8SUMRqLrVaJh7R2b6Zz62pf5rfF4l6YP6V9C NfXbQ+XikhAqY2LwBM/KsrE8sgCk83Po3OgZfEGxkfqZ83pKIucLEnpSC5C685PkLwq9 YQCBIbYhjA3BnzZhh4GQP3MnWl4d4y5qFBc/6+AW/ERXrEebOwFbpGTWUUGldBisP2Nn GuX9xnUCmu5CDkpXMJalK/dBXpU6fg2w6113NF3sBfXB3pegdgm6gg6W5yqiIt71BNYv 1aracaBec9TKLYR3u+v6b5jxKE5K1Q07c5pZTzlx0x3ejRKSwQ1SgDiuaYTKgQOykOlT cwxA==
- In-reply-to: <5315c85d-abda-fdb5-271f-22a7805eea27@zentaur.org>
- List-help: <mailto:zsh-workers-help@zsh.org>
- List-id: Zsh Workers List <zsh-workers.zsh.org>
- List-post: <mailto:zsh-workers@zsh.org>
- List-unsubscribe: <mailto:zsh-workers-unsubscribe@zsh.org>
- Mailing-list: contact zsh-workers-help@xxxxxxx; run by ezmlm
- References: <b72ceb70-aa91-4230-98fe-1ba5cdf0bb46@zentaur.org> <20190420043349.GA52075@CptOrmolo.darkstar> <CAHYJk3ST9=VenXRmJ795TFccvYzvd2PhrtM0YajdNCxi=EPzEA@mail.gmail.com> <5315c85d-abda-fdb5-271f-22a7805eea27@zentaur.org>
On 4/20/19, Clinton Bunch <cdb_zshl@xxxxxxxxxxx> wrote:
> Mikael Magnusson wrote:
>> On 4/20/19, Matthew Martin <phy1729@xxxxxxxxx> wrote:
>>> On Fri, Apr 19, 2019 at 02:54:47PM -0500, Clinton Bunch wrote:
>>>> On at least one system mktemp produces very predictable names:
>>>>
>>>> % () { print File: $1; cat $1 } =(print "Hello World")
>>>> File: /tmp/zsh010785
>>>> Hello World
>>>> % () { print File: $1; cat $1 } =(print "Hello World")
>>>> File: /tmp/zsh010785
>>>> Hello World
>>>> % () { print File: $1; cat $1 } =(print "Hello World")
>>>> File: /tmp/zsh010785
>>>> Hello World
>>>> % echo $$
>>>> 10785
>>>>
>>>> This provides an alternate implementation for generating and opening
>>>> temp
>>>> file names. I considered only using this implementation on known bad
>>>> systems, but I have no way of knowing all of them (or testing for them
>>>> in
>>>> configure). I see no reason to expect system implementations of mktemp
>>>> or
>>>> mkstemp to be significantly faster than mine unless written in assembly
>>>> (which seems unlikely).
>>> I would strongly prefer using the implementation only on known bad
>>> systems (or prodding the relevant vendors to fix their system). I don't
>>> think speed should be the main consideration here; rather the primary
>>> concern should be security. While your patch is certainly better than
>>> using the native mktemp on at least one system, it would be worse than
>>> the native mktemp on say FreeBSD which uses arc4random_uniform which
>>> does not require a user provided seed nor does it have modulo bias.
> We still face the problem of determining which systems have broken
> implementations. I know of one, that doesn't mean there aren't others.
> My implementation could easily be modified to use arc4random_uniform
> on those system on which it is available if that's the primary
> objection. I'd have used /dev/urandom (at least as a seed) if it were
> available everywhere.
>> The commit message is incomplete, it claims that mktemp is insecure on
>> one system, therefore it replaces mkstemp, which makes no sense. Is
>> mkstemp also insecure on that system, is it not available at all? Do
>> we not even attempt to use mkstemp?
>>
>> Also, please make at least some attempt to use the same coding style
>> as the rest of the code base, ie try to use the space bar sometimes.
>> (You're not even consistent with yourself in some places).
>>
> mkstemp uses the same insecure naming structure. That is the normal
> case so it seemed redundant to mention it.
mkstemp returns an open file descriptor whereas mktemp returns a
string. According to the specification using mkstemp will always
create a new file that didn't exist, and is safe. If an OS
implementation somehow clobbers existing files when you call mkstemp()
then that's very broken and should be immediately fixed. The worst
outcome of the name being predictable is that someone can perform a
DOS attack against you, ie preventing you from creating a file, but
they won't gain control of any created files.
> Are the code style settings codified anywhere? The tabs were added by
> Vim's autoident. A set of options for indent or astyle would make it
> easier for anyone to meet the coding style.
Yeah, Etc/zsh-development-guide. It doesn't explicitly mention that
you should put spaces around operators, but you should do that too.
Ie, these lines
+ztempfile(char *template,int slen,enum zmt_action action, int *fd)
+ int padlen=0,r,i,len,success=0,failure=0,attempts=0;
and others
should look like this
+ztempfile(char *template, int slen, enum zmt_action action, int *fd)
+ int r, i, len;
+ int padlen = 0, success = 0, failure = 0, attempts = 0;
--
Mikael Magnusson
Messages sorted by:
Reverse Date,
Date,
Thread,
Author