Date: Wed, 24 Nov 2021 14:59:54 +0300 From: Gleb Popov <arrowd@freebsd.org> To: Mehmet Erol Sanliturk <m.e.sanliturk@gmail.com> Cc: FreeBSD Hackers <freebsd-hackers@freebsd.org> Subject: Re: Call for Foundation-supported Project Ideas Message-ID: <CALH631kbCFEZ6Y%2Bk7mV8nOVTboTQaMPSJWcQDHbzwNf32u65AA@mail.gmail.com> In-Reply-To: <CAOgwaMuA7ND4_eU=jfEdj%2BEDeUOGey4dMtwZniitTQe7DaTzDg@mail.gmail.com> References: <861r36xzpe.fsf@phe.ftfl.ca> <CAOgwaMuA7ND4_eU=jfEdj%2BEDeUOGey4dMtwZniitTQe7DaTzDg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--00000000000024c70b05d1879a11 Content-Type: text/plain; charset="UTF-8" On Wed, Nov 24, 2021 at 2:11 PM Mehmet Erol Sanliturk < m.e.sanliturk@gmail.com> wrote: > Another important problem is mounting of hard disks connected through a > USB port or a hot-pluggable port . > Such connections ( excluding if DOS or NTFS ones are permitted implicitly > ) require a "root" mount . There is an idea > "Use sudo or other super user programs for "allowance" of "root" user" . In > my life , I never could understand > "How is it possible to manage to protect the security of a system by using > such a facility from the "user" space ? " > > Is it not possible to allow the user to use a mount command for such > non-DOS or non-NTFS devices ? > Why is it necessary to have a fear about such mounting ? > Please do NOT forget that the computer is available to the user PHYSICALLY > . He ( let's assume he may use violence ) > can destroy , crash , burn , ... , etc. , the computer PHYSICALLY . Such a > possibility is not considered , but an innocent > "user" space mount is assumed to be harmful . > This is usually solved by having a mounting daemon that runs as root and handles user requests for mounting volumes. Linux has udisks2 for this and we have sysutils/bsdisks --00000000000024c70b05d1879a11--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CALH631kbCFEZ6Y%2Bk7mV8nOVTboTQaMPSJWcQDHbzwNf32u65AA>