Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 7 Oct 1999 11:04:40 -0700 (PDT)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        wsanchez@apple.com, Pat Dirks <pwd@apple.com>, Alban Hertroys <dalroi@wit401310.student.utwente.nl>
Cc:        FreeBSD Hackers <FreeBSD-Hackers@FreeBSD.ORG>
Subject:   Re: Apple's planned appoach to permissions on movable filesystems
Message-ID:  <199910071804.LAA95956@apollo.backplane.com>
References:   <19991007060251.6D1A71DD0@wit401310.student.utwente.nl>

next in thread | previous in thread | raw e-mail | index | archive | help
:On  6 Oct, Wilfredo Sanchez wrote:
:> | I would rather brand the filesystem with the ID of the host. The
:> | starting situation is an "unmarked" filesystem. If a host detects the 
:> | mounting of an "unmarked" filesystem, it will brand it with it's ID. If 
:> | it detects a filesystem that has an ID that differs from the host's ID, 
:> | it is a foreign filesystem. Seems quite simple to me...
:> 
:>   But then you have to put that information on the disk, and you're  
:> back to trusting the disk.  "Um, yeah, I'm local. Trust me."
:
:Hmmm... But you can also fake the filesystem ID to be one that was
:previously known by the system. Just make the filesystem local, put
:some horrible executables on it, and write back the original idea (if
:that's at all necessary, I'm still not sure it gets changed in between).

    Ignoring the security issues for the moment, I think putting the
    FQDN (fully qualified domain name) of the 'owner' of the disk volume
    could prove extremely useful in the new internet age.  As machines
    get better connected, such information could eventually be used by
    the operating system to translate user id's on the fly by using the
    domain name in the label to contact the host in question in order to
    obtain the translation.  Something similar to MX DNS records (i.e. a
    hierarchically specified 'user translation' service) would glue it all
    together.

    Baring the availability of a domain name, some sort of unique ID could
    potentially serve the same function, but without the ability to look it
    up on the internet.  Perhaps the real solution is to allow sites to 
    distribute and maintain unique id's based on their domain name, e.g.
    FU123BAC@<domain>.  These sites could also offer the uid translation
    service to its customers.

:The problem is that you write a "unique" ID on the disk. You can read
:the disk, so you can store that ID and write it back if you do want to
:harm somebody. Is public key encryption, or something like that, a
:solution? Or is this not necessary?
:
:My .001 cts.
:
:-- 
:Alban Hertroys.
:http://wit401310.student.utwente.nl

    Revisiting security now...

    A provision for public-key encryption of the data held on the disk (as
    well as the id itself) would be useful.  Just encrypting the ID alone
    would not be useful.

    The distinction would then shift away from whether the media is removable
    or not (it would no longer matter as much) and instead assume that no
    unencrypted data can ever be trusted and encrypted data can be trusted
    insofar as the ID can be trusted.

    Methinks this could result in a very useful project - an 'encrypted' UFS
    filesystem implementation plus domain based services to translate uid's
    on the fly.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199910071804.LAA95956>