Date: Tue, 4 Jul 2000 08:32:08 -0500 (EST) From: Jonathan Smith <jonsmith@dragonstar.dhs.org> To: David Malone <dwmalone@maths.tcd.ie> Cc: cjclark@alum.mit.edu, Brad Knowles <blk@skynet.be>, Vivek Khera <khera@kciLink.com>, freebsd-stable@FreeBSD.ORG Subject: Re: fstab mount options Message-ID: <Pine.BSF.4.21.0007040830490.2701-100000@dragonstar.dhs.org> In-Reply-To: <20000704100305.A10201@walton.maths.tcd.ie>
next in thread | previous in thread | raw e-mail | index | archive | help
One way around that (with XDM) is to chown /console/* to the user when chowning the device and remove execute perms on /console so that the devices would be /console/cdrom, /console/floppy, etc. :) Then you can get, say, amd to do the tricks of mounting it. j. -- Close your eyes. Now forget what you see. What do you feel? -- My heart. -- Come here. -- Your heart. -- See? We're exactly the same. Jon Smith -- Senior Math Major @ Purdue On Tue, 4 Jul 2000, David Malone wrote: > On Mon, Jul 03, 2000 at 04:30:45PM -0700, Crist J. Clark wrote: > > The risk I see is does this method let users mount with setuid? > > Not by the looks of things - you can also only mount on directories > owned by yourself. It's enforced in the mount syscall. > > temp1# sysctl -w vfs.usermount=1 > vfs.usermount: 0 -> 1 > temp1# suspend > Suspended > > mount vn0 /mnt > mount: Operation not permitted > > mkdir blah > > mount vn0 blah > > mount | fgrep blah > vn0 on /usr/home/dwmalone/blah (ufs, local, nodev, nosuid, mounted by dwmalone, writes: sync 2 async 0, reads: sync 14 async 0) > > umount blah > > fg > su > temp1# sysctl -w vfs.usermount=0 > > David. > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-stable" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007040830490.2701-100000>