docs: replace insecure /tmp examples in qsd docs
commite246bf3ddc4d61d03227373fecfdcd4fec3508db
authorStefan Hajnoczi <stefanha@redhat.com>
Mon, 1 Mar 2021 17:27:28 +0000 (1 17:27 +0000)
committerKevin Wolf <kwolf@redhat.com>
Mon, 8 Mar 2021 13:55:19 +0000 (8 14:55 +0100)
tree4c288a4187675519e29609c786d3e315d9b4c681
parent3f14b909ebe7296eef6d4b1a1ed5f602ab129602
docs: replace insecure /tmp examples in qsd docs

World-writeable directories have security issues. Avoid showing them in
the documentation since someone might accidentally use them in
situations where they are insecure.

There tend to be 3 security problems:
1. Denial of service. An adversary may be able to create the file
   beforehand, consume all space/inodes, etc to sabotage us.
2. Impersonation. An adversary may be able to create a listen socket and
   accept incoming connections that were meant for us.
3. Unauthenticated client access. An adversary may be able to connect to
   us if we did not set the uid/gid and permissions correctly.

These can be prevented or mitigated with private /tmp, carefully setting
the umask, etc but that requires special action and does not apply to
all situations. Just avoid using /tmp in examples.

Reported-by: Richard W.M. Jones <rjones@redhat.com>
Reported-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Message-Id: <20210301172728.135331-3-stefanha@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by: Richard W.M. Jones <rjones@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
docs/tools/qemu-storage-daemon.rst