Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Grain backup fails if /var contains irregular files (sockets, pipes) #100

Closed
dwrensha opened this issue Aug 24, 2014 · 6 comments · Fixed by #277
Closed

Grain backup fails if /var contains irregular files (sockets, pipes) #100

dwrensha opened this issue Aug 24, 2014 · 6 comments · Fixed by #277
Assignees
Labels

Comments

@dwrensha
Copy link
Collaborator

Backup failed: Error: Zip process failed. [500]

@jparyani
Copy link
Collaborator

This is caused by the dovecot process leaving socket files under /var, and the zip command failing when it encounters them.

I'd rather fix this on Sandstorm's end, but I will also try and see if I can change dovecot to put these under /tmp.

@kentonv kentonv added the bug label Sep 17, 2014
@kentonv kentonv changed the title grain backup fails in RoundCube Grain backup fails if /var contains irregular files (sockets, pipes) Sep 17, 2014
@CameronNemo
Copy link

@jparyani putting them in /tmp leaves huge vectors for security exploitation of Dovecot and/or leaked information from what feeds into Dovecot's socket.

@kentonv
Copy link
Member

kentonv commented Nov 5, 2014

@CameronNemo - How so? Under Sandstorm, every app sees a unique /tmp which is not visible to anyone else.

@CameronNemo
Copy link

From attacks from within the app container. Unless there is only one process, or if they are all running under the same user. I am guessing it falls under the latter definition, so there is no actual risk?

@kentonv
Copy link
Member

kentonv commented Nov 5, 2014

Each container contains a single app instance owned by a single user. Our security model is based on every user having their own private instance of each app. So, I don't think there's a security issue here.

@amluto
Copy link
Contributor

amluto commented Nov 18, 2014

FWIW, /run seems to be the new consensus place for things like this.

@jparyani jparyani self-assigned this Feb 27, 2015
jparyani added a commit to jparyani/sandstorm that referenced this issue Feb 27, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants