Rich access control lists
Rich access control lists
Posted Oct 21, 2015 1:41 UTC (Wed) by JeffBai (guest, #103577)Parent article: Rich access control lists
Doesn't sound like some nice `protection'.
Posted Oct 21, 2015 4:00 UTC (Wed)
by mathstuf (subscriber, #69389)
[Link] (14 responses)
Posted Oct 21, 2015 7:57 UTC (Wed)
by mjthayer (guest, #39183)
[Link] (13 responses)
Posted Oct 21, 2015 12:44 UTC (Wed)
by mathstuf (subscriber, #69389)
[Link] (12 responses)
Can an old kernel at least mount the filesystem read-only?
Posted Oct 21, 2015 15:01 UTC (Wed)
by felixfix (subscriber, #242)
[Link] (9 responses)
Posted Oct 21, 2015 15:16 UTC (Wed)
by niner (subscriber, #26151)
[Link] (8 responses)
If you're not improving security by denying read only mount and you're not preventing any erroneous modifications, then why prohibit it?
Posted Oct 21, 2015 16:23 UTC (Wed)
by felixfix (subscriber, #242)
[Link] (7 responses)
Posted Oct 21, 2015 16:34 UTC (Wed)
by niner (subscriber, #26151)
[Link] (5 responses)
If you as an attacker want to circumvent file permissions and the way you do it is by booting a different kernel, no feature bit in the world can stop you. To boot the other kernel you either have physical access to the media, or at least root access to the machine. So the feature bit is completely worthless as protection.
File permissions are a security device in a running system. Once the system is not running anymore be it because the drives are removed or the system is rebooted, the security is gone. That's why we have disk encryption. Disk encryption won't help you if the attacker breaks into the running system. File permissions may. But disk encryption helps you where file permissions won't: with offline attacks.
Posted Oct 21, 2015 16:55 UTC (Wed)
by bfields (subscriber, #19510)
[Link] (2 responses)
If you're mounting an ACL-protected filesystem on a multi-user system that isn't capable of enforcing them then there's a reasonable chance you're just making a mistake.
I assume there's some way to clear the flag if you still really want to do it.
Posted Oct 21, 2015 23:06 UTC (Wed)
by neilbrown (subscriber, #359)
[Link] (1 responses)
You are showing your age! It has been for many years that trying to mount an already-mounted block device simply creates a bind-mount.
Posted Oct 22, 2015 1:52 UTC (Thu)
by bfields (subscriber, #19510)
[Link]
Already??
Sigh; I was paying attention to this, honest! Thanks for the correction.
Posted Oct 21, 2015 23:03 UTC (Wed)
by smoogen (subscriber, #97)
[Link] (1 responses)
Posted Oct 22, 2015 0:15 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link]
XKCD explains that succinctly: https://xkcd.com/1200/
Posted Oct 21, 2015 16:35 UTC (Wed)
by mjthayer (guest, #39183)
[Link]
Posted Oct 28, 2015 10:24 UTC (Wed)
by Seegras (guest, #20463)
[Link] (1 responses)
You don't mind something ignoring the ACLs, but you don't want it to delete them. ACL-insensitive-but-ACL-preserving ;)
Posted Oct 28, 2015 23:55 UTC (Wed)
by mathstuf (subscriber, #69389)
[Link]
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
Rich access control lists
So, no, it absolutely was not meant in that way.
Rich access control lists
Rich access control lists
> -EBUSY on attempts to mount the same block device twice.
You do get -EBUSY if you mount a block device on a directory where the same block device is mounted, but I think that is just to stop repeated "mount -a" from flooding the mount table.
Rich access control lists
You are showing your age!
It has been for many years that trying to mount an already-mounted block device simply creates a bind-mount. You do get -EBUSY if you mount a block device on a directory where the same block device is mounted, but I think that is just to stop repeated "mount -a" from flooding the mount table.
Rich access control lists
Rich access control lists
So pretty much every system out there?
Rich access control lists
Rich access control lists
Rich access control lists