Defending mounted filesystems from the root user
Defending mounted filesystems from the root user
Posted Aug 23, 2023 14:03 UTC (Wed) by draco (subscriber, #1792)In reply to: Defending mounted filesystems from the root user by zeno_kdab
Parent article: Defending mounted filesystems from the root user
It's fair to say that in a scenario where you're computing in malicious environments that you must be able to trust some of your hardware — if you can't trust the CPU itself, you're doomed, sure. But with a trusted computing core and IOMMU, you can (in principle) mitigate malicious I/O if you write the drivers defensively.
Posted Aug 23, 2023 17:21 UTC (Wed)
by zeno_kdab (guest, #165579)
[Link]
Imho either you trust your hardware, and don't want your FS drivers to be slowed down by being implemented super defensively, always rechecking everything etc. Or you don't trust, but then you should be fine taking the perf hit by using FUSE or a VM to isolate the hardware handling from your host kernel.
Having said that, I always dream about a new OS kernel that transcends the monolithic/micro-dichotomy by easily allowing to move all kinds of driver into userspace and back ;)
Defending mounted filesystems from the root user
