rsync CVE-2022-29154 and RPKI Validation

Matt Corallo nanog at as397444.net
Fri Sep 9 18:39:01 UTC 2022


On 9/9/22 1:58 PM, Vincent Bernat wrote:
> On 2022-09-09 19:36, Matt Corallo wrote:
> 
>>> The attacker is still limited to the target directory. The attacker can send files that were 
>>> excluded or not requested, but they still end up in the target directory. RPKI validators 
>>> download stuff in a dedicated download directory
>>
>> Ah, okay, thanks, its a shame that wasn't included in any of the disclosure posts I managed to 
>> find :(
> 
> It's explained in the manual page: 
> https://manpages.debian.org/unstable/rsync/rsync.1.en.html#MULTI-HOST_SECURITY

Heh, right, so not in any of the disclosure posts :p

>>> (but it may be shared with several peers)
>>
>> I assume I'm mis-reading this - RPKI servers aren't able to overwrite output from other RPKI 
>> servers, so it shouldn't be shared, no?
> 
> Yes, it shouldn't, but maybe RPKI servers are still downloading all of them in a single directory. 
> Looking at cfrpki, it looks like it works this way (didn't test).

Hmm, ouch, is there a corresponding security disclosure from cfrpki? I guess cfrpki sees pretty 
limited use these days.

Thanks,
Matt


More information about the NANOG mailing list