diff options
author | Miklos Szeredi <miklos@szeredi.hu> | 2004-02-25 08:39:42 +0000 |
---|---|---|
committer | Miklos Szeredi <miklos@szeredi.hu> | 2004-02-25 08:39:42 +0000 |
commit | e970f305d4708134c60a9b416bd48793ac3e8844 (patch) | |
tree | 5e06eeb2a21db0a7a17d03c69f63ff51c72195dd /README | |
parent | c40748abd7f911b3c622600bd23b8517bd8f09c4 (diff) |
fix
Diffstat (limited to 'README')
-rw-r--r-- | README | 35 |
1 files changed, 13 insertions, 22 deletions
@@ -54,12 +54,10 @@ steps (after installing FUSE): If it doesn't work out, please ask! Also see the file 'include/fuse.h' for detailed documentation of the library interface. -You can also mount your filesystem like this: +The fusermount program accepts a couple of additional options (see +'fusermount -h'). You can add these options after a '--' like this: - fusermount /mnt/whatever example/fusexmp -d - -The fusermount program now accepts a couple of additional options. -Run it with the '-h' option to see a description. + example/fusexmp /mnt/whatever -d -- -l Security ======== @@ -80,22 +78,15 @@ doing nasty things. Currently those limitations are: - No other user (including root) can access the contents of the mounted filesystem. -When linux will have private namespaces (as soon as version 2.5 comes out -hopefully) then this third condition is useless and can be gotten rid of. - -Currently the first two conditions are checked by the fusermount program -before doing the mount. This has the nice feature, that it's totally -useless. Here's why: - - - user creates /tmp/mydir - - user starts fusermount - - user removes /tmp/mydir just after fusermount checked that it is OK - - user creates symlink: ln -s / /tmp/mydir - - fusermount actually mounts user's filesystem on '/' - - this is bad :( +Currently the first two conditions are checked by the fusermount +program before doing the mount. This is in fact not perfectly secure, +since there is a window of time, after fusermount has checked the +mountpoint and before the mount actually takes place, when the user is +able to change the mountpoint (e.g. by changing symbolic links). -So to make this secure, the checks must be done by the kernel. And so -there is a patch (patch/ms_permission.patch) which does exactly this. -This is against 2.4.14, but applies to some earlier kernels (not too -much earlier though), and possibly some later. +The preferred method would be if the kernel would check the +permissions. There is a patch for this for the 2.6.X kernel (where X +>= 3) in the patch directory. If you apply this patch then the suid +bit can be removed from the fusermount program. +Comments about this are appreciated. |