Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Nov 2021 14:59:54 +0300
From:      Gleb Popov <arrowd@freebsd.org>
To:        Mehmet Erol Sanliturk <m.e.sanliturk@gmail.com>
Cc:        FreeBSD Hackers <freebsd-hackers@freebsd.org>
Subject:   Re: Call for Foundation-supported Project Ideas
Message-ID:  <CALH631kbCFEZ6Y%2Bk7mV8nOVTboTQaMPSJWcQDHbzwNf32u65AA@mail.gmail.com>
In-Reply-To: <CAOgwaMuA7ND4_eU=jfEdj%2BEDeUOGey4dMtwZniitTQe7DaTzDg@mail.gmail.com>
References:  <861r36xzpe.fsf@phe.ftfl.ca> <CAOgwaMuA7ND4_eU=jfEdj%2BEDeUOGey4dMtwZniitTQe7DaTzDg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--00000000000024c70b05d1879a11
Content-Type: text/plain; charset="UTF-8"

On Wed, Nov 24, 2021 at 2:11 PM Mehmet Erol Sanliturk <
m.e.sanliturk@gmail.com> wrote:

> Another important problem is mounting of  hard disks connected through a
> USB port or a hot-pluggable port .
> Such connections ( excluding  if DOS or NTFS ones are permitted implicitly
> ) require a "root" mount . There is an idea
> "Use sudo or other super user programs for "allowance" of "root" user" . In
> my life , I never could understand
> "How is it possible  to manage to protect the security of a system by using
> such a facility from the "user" space ? "
>
> Is it not possible to allow the user to use a mount command for such
> non-DOS or non-NTFS devices ?
> Why is it necessary to have a fear about such mounting ?
> Please do NOT forget that the computer is available to the user  PHYSICALLY
> . He ( let's assume he may use violence )
> can destroy , crash , burn , ... ,  etc. , the computer PHYSICALLY . Such a
> possibility is not considered , but an innocent
> "user" space mount is assumed to be harmful .
>

This is usually solved by having a mounting daemon that runs as root and
handles user requests for mounting volumes.
Linux has udisks2 for this and we have sysutils/bsdisks

--00000000000024c70b05d1879a11--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CALH631kbCFEZ6Y%2Bk7mV8nOVTboTQaMPSJWcQDHbzwNf32u65AA>