From owner-freebsd-current Thu Jan 30 16:24:32 2003 Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 28C7837B401 for ; Thu, 30 Jan 2003 16:24:31 -0800 (PST) Received: from mailsrv.otenet.gr (mailsrv.otenet.gr [195.170.0.5]) by mx1.FreeBSD.org (Postfix) with ESMTP id AFFB443F85 for ; Thu, 30 Jan 2003 16:24:26 -0800 (PST) (envelope-from keramida@ceid.upatras.gr) Received: from gothmog.gr (patr530-b205.otenet.gr [212.205.244.213]) by mailsrv.otenet.gr (8.12.6/8.12.6) with ESMTP id h0V0O3Vq013789; Fri, 31 Jan 2003 02:24:04 +0200 (EET) Received: from gothmog.gr (gothmog [127.0.0.1]) by gothmog.gr (8.12.6/8.12.6) with ESMTP id h0V0O2qA049162; Fri, 31 Jan 2003 02:24:02 +0200 (EET) (envelope-from keramida@ceid.upatras.gr) Received: (from giorgos@localhost) by gothmog.gr (8.12.6/8.12.6/Submit) id h0V0O0DB049161; Fri, 31 Jan 2003 02:24:00 +0200 (EET) (envelope-from keramida@ceid.upatras.gr) Date: Fri, 31 Jan 2003 02:24:00 +0200 From: Giorgos Keramidas To: Garrett Wollman Cc: Kirk McKusick , freebsd-current@FreeBSD.org Subject: Re: dump -L and privilege Message-ID: <20030131002400.GC758@gothmog.gr> References: <7miswoocye.wl@black.imgsrc.co.jp> <200301300217.h0U2HVFL015158@beastie.mckusick.com> <200301302052.h0UKqW6m008952@khavrinen.lcs.mit.edu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200301302052.h0UKqW6m008952@khavrinen.lcs.mit.edu> Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On 2003-01-30 15:52, Garrett Wollman wrote: > < said: > > The other alternative would be to > > create a setuid-to-root program that would take a snapshot and > > chown it to the user that does dumps. > > I think this would actually be a useful feature for more than just > dumps. I might want to allow some users (say, those in group > `operator') to be able to create snapshots on their own, without > allowing arbitrary mounting privileges. Do normal permissions apply for the files included in a snapshot? It would be horrible from a security standpoint if any user could use a setuid program to snapshot filesystems, mount the snapshot to places of their own, and read random files from the mounted snapshot. - Giorgos To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message