1 |
On Tue, 2022-01-04 at 19:26 +0100, Piotr Karbowski wrote: |
2 |
> |
3 |
> And none of which happens unless you intentionally trigger it. |
4 |
> |
5 |
> ... |
6 |
> |
7 |
> Sure, acl and how chmod manipulate mask on ACL-enabled entities is not |
8 |
> very simple, but nothing will break by itself just because you have acl |
9 |
> support enabled, you would need to try very hard to run into problems. |
10 |
> |
11 |
> |
12 |
|
13 |
Even if you're right, and if no other tools invoke tar, and the user is |
14 |
smart enough not to copy/paste commands from the web, and if no other |
15 |
archivers can extract ACLs when invoked directly or indirectly... |
16 |
you're still burdening the user to either have faith that this is all |
17 |
true, or to verify it himself. Repeat the argument for other flags like |
18 |
ipv6, and you wind up requiring either a lot of faith, or a lot of |
19 |
diligence, both of which are antithetical to basic principles of |
20 |
security. |
21 |
|
22 |
You may not buy the argument, but it's why people disable this stuff, |
23 |
and the ability to disable it is why a lot of our users user Gentoo to |
24 |
begin with. |