From owner-freebsd-questions Tue Jan 29 3: 3:24 2002 Delivered-To: freebsd-questions@freebsd.org Received: from speechpro.com (crt-gw.infopro.spb.su [195.201.254.5]) by hub.freebsd.org (Postfix) with ESMTP id 6705D37B405 for ; Tue, 29 Jan 2002 03:03:22 -0800 (PST) Received: from igorr by sysadm.stc with local (Exim 3.33 #1) id 16VW6R-0006SX-00 for freebsd-questions@FreeBSD.ORG; Tue, 29 Jan 2002 14:07:03 +0300 Date: Tue, 29 Jan 2002 14:07:03 +0300 From: Igor Roboul To: freebsd-questions@FreeBSD.ORG Subject: Re: User mounts of ISO images? Message-ID: <20020129110703.GA24674@sysadm.stc> Reply-To: igorr@speechpro.com Mail-Followup-To: Igor Roboul , freebsd-questions@FreeBSD.ORG References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.3.26i Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On Tue, Jan 29, 2002 at 11:54:18AM +0100, Michael Sperber [Mr. Preprocessor] wrote: > > So I know how to enable user mounts for actual drives hooked up to the > system. Is there any way to user-enable vnconfig as well for safe (as > far as that goes) use by ordinary users? /usr/ports/security/sudo then write some scripts for safe mounting ISOs and allow execution of these scripts via sudo. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message