That was a “fun” debugging session…

    • lorty@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      ·
      6 months ago

      I just assumed that whenever it would be expanded that the contents would have the default permissions for that user.

      It’s actually a cool feature I just feel dumb for how long it took me to realize this was the issue.

  • tetris11@lemmy.ml
    link
    fedilink
    arrow-up
    11
    ·
    edit-2
    6 months ago

    Just bear in mind that uid 1001 on one machine is not generally uid 1001 on another, and that if you copy the tar off machine you’re more than likely giving permission to somebody other than the intended target

  • HiddenLayer555@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    6 months ago

    Worse, it preserves “special” files like the ones in /dev or /var which aren’t removable by anyone other than root. Love extracting a system file backup in my file server as a regular user in order to get just a few files out of it, and promptly not being able to fully delete it afterward without SSHing into the server and using sudo.

    I don’t get how a regular user can even create files like that. Sounds like a security vulnerability.

  • monovergent@lemmy.ml
    link
    fedilink
    arrow-up
    5
    ·
    6 months ago

    Learned to make use of this the hard way when transferring a directory over a FAT32 USB drive messed up the permissions.