LWN: Comments on "Unprivileged filesystem mounts, 2018 edition" https://lwn.net/Articles/755593/ This is a special feed containing comments posted to the individual LWN article titled "Unprivileged filesystem mounts, 2018 edition". en-us Thu, 06 Nov 2025 21:21:48 +0000 Thu, 06 Nov 2025 21:21:48 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/763449/ https://lwn.net/Articles/763449/ ssmith32 <div class="FormattedComment"> I kind of feel like, once you've convinced the user to install your software, convincing them to type in their admin password is not far behind, and, at that stage, why rely on a vulnerability to do something?<br> </div> Fri, 24 Aug 2018 19:21:11 +0000 lklfuse https://lwn.net/Articles/762445/ https://lwn.net/Articles/762445/ fest3er <div class="FormattedComment"> ... and well we all know that "the good enough is the enemy of the best".<br> <p> Brings to mind Brian Wilson's quip: "Beware the lollipop of mediocrity; lick it once and you'll suck forever."<br> </div> Mon, 13 Aug 2018 03:52:02 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/757990/ https://lwn.net/Articles/757990/ philipstorry <div class="FormattedComment"> I'd imagine that IBM offered it so that their customers could migrate to Linux.<br> <p> It's curious to hear you call JFS a "me-too", as it predates the Linux kernel by over a year. (It originated with IBM's AIX systems in 1990, was later ported to OS/2, and finally to Linux.)<br> <p> It's actually quite a nice filesystem for general use. It's got metadata journalling, uses extents and allocation groups, and has a reputation for being fast even under heavy loads whilst not consuming much CPU or memory itself.<br> <p> XFS is probably the filesystem it's most natural to compare JFS to, as they have similar core features and were both ported to Linux at around the same time in 2001. It's also an OS that came from an old UNIX (IRIX) and is only three years younger than JFS, so understandably has a number of similar design decisions. It seems both were pretty cutting edge for the early 1990's!<br> <p> I wasn't terribly involved with Linux back in 2001 when they were both ported, but it seems that XFS rapidly won the mindshare battle - it accrued more developers around it. Perhaps that's because SGI were more open to contributions from other developers than IBM were? Or maybe it's because its 64-bit on-disk structure gave it higher headline stats in terms of maximum sizes?<br> <p> Certainly one of the things I've recently admired about JFS is that it's very much in "maintenance mode" these days. That may not be exciting or sexy, but it does make it attractive it you're looking for reliability. I suspect that the unchanging nature of JFS is why it tends to get discounted - it's not adding new features, but the ones it has are well implemented and reliable. But the tech industry and community likes the shiny new things, and JFS lost its shiny new feel over a decade ago.<br> <p> Now it's simply a reliable workhorse.<br> <p> The main reasons to avoid it are either feature requirements (and they're more likely to be COW based) or simply the concern that at some point it may be deprecated due to its inactivity. That sort of concern is kind of a self-reinforcing feedback look really, and I suspect it's started to happen already.<br> <p> However, it's served three different operating systems well, and is still a viable choice for many purposes. It's a pity JFS doesn't get a little more respect...<br> <p> </div> Thu, 21 Jun 2018 21:33:13 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/757892/ https://lwn.net/Articles/757892/ mstone_ <div class="FormattedComment"> I've lost data to JFS. I'm also not really sure why it exists other than as a me-too from IBM as it offered nothing that wasn't available in other linux filesystems.<br> </div> Wed, 20 Jun 2018 18:56:32 +0000 lklfuse https://lwn.net/Articles/756956/ https://lwn.net/Articles/756956/ nix <div class="FormattedComment"> Also being free, and more-or-less portable, and not having PR1ME's, uh, reputation for eccentricity and fairly terrible marketing probably helped. Network effects kicked in from that point on: we already have Unix software, we don't want to massively rewrite it... the only option is another Unix.<br> </div> Fri, 08 Jun 2018 15:03:18 +0000 lklfuse https://lwn.net/Articles/756816/ https://lwn.net/Articles/756816/ Wol <div class="FormattedComment"> That's always felt pretty arrogant to me.<br> <p> Pr1mos was a Multics derivative, and I've always felt that in MANY ways it was better than Unix. Unix (in the form of BSD) just happened to be free, and gained traction, and well we all know that "the good enough is the enemy of the best".<br> <p> Cheers,<br> Wol<br> </div> Thu, 07 Jun 2018 07:08:47 +0000 Safely mounting random images: Use a VM? https://lwn.net/Articles/756618/ https://lwn.net/Articles/756618/ robbe <div class="FormattedComment"> You’re basically echoing Ted’s suggestion from<br> <a href="https://lwn.net/Articles/755669/">https://lwn.net/Articles/755669/</a><br> <p> As to FUSE always playing catch-up, why not flip that around for filesystems like FAT, which are mounted untrusted in the *majority* of uses (e.g. the mentioned automount-my-usb-stick)? The in-kernel FAT implementation would be relegated to legacy status, while distributors made sure that the automount would set up a userspace equivalent (FUSE, or gvfs, or whatever).<br> <p> That wouldn’t work out for the container case, though.<br> </div> Tue, 05 Jun 2018 12:49:07 +0000 Safely mounting random images: Use a VM? https://lwn.net/Articles/756493/ https://lwn.net/Articles/756493/ david.a.wheeler <div class="FormattedComment"> There seems to be two fundamentally different ways of using a "disk" image. One is using a trusted image as fast as possible, and the other is one you don't trust. In many circumstances the image is trusted, so it makes sense that the "one you don't trust" has never gotten an adequate amount of effort.<br> <p> FUSE, as far as I know, doesn't support all the options and features you'd want, and it's always playing catch-up. You can't run a different kernel in a container, either.<br> <p> The only "easy safe way" I see to access a disk image you don't trust is to run a VM to access the drive and has no other access (in particular, no external network). Then "share" it over a simulated network that only has internal access. This does trust that the VMM is adequately protected, but that has a chance. Then you can run the *native* kernel code to read it. If the system gets broken into, you only get the VM &amp; what it can see.<br> <p> That's a pretty heavyweight approach. Is there a better one?<br> </div> Mon, 04 Jun 2018 14:55:38 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756310/ https://lwn.net/Articles/756310/ stevan <div class="FormattedComment"> Personal experience - JFS remains the only filesystem from which I have never lost data, though I have not used BTRFS or ZFS in anger. It's old and relatively unloved, but seems to work at human-manageable-scale systems. Data loss leaves lasting scars.<br> </div> Sat, 02 Jun 2018 10:27:19 +0000 lklfuse https://lwn.net/Articles/756223/ https://lwn.net/Articles/756223/ smurf <div class="FormattedComment"> The point is, 9P does work. So does FUSE … has anybody done an in-depth comparison of these protocols?<br> </div> Fri, 01 Jun 2018 12:51:30 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756213/ https://lwn.net/Articles/756213/ ehiggs <div class="FormattedComment"> Sure. Here are some CVEs that demonstrate how maliciously crafted dmg files are indeed a potential attack vector:<br> <p> <a href="https://www.cvedetails.com/cve/CVE-2018-4176/">https://www.cvedetails.com/cve/CVE-2018-4176/</a><br> <a href="https://www.cvedetails.com/cve/CVE-2015-7110/">https://www.cvedetails.com/cve/CVE-2015-7110/</a><br> </div> Fri, 01 Jun 2018 08:23:00 +0000 lklfuse https://lwn.net/Articles/756099/ https://lwn.net/Articles/756099/ bendystraw <div class="FormattedComment"> We'd be so lucky.<br> </div> Thu, 31 May 2018 11:52:51 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756098/ https://lwn.net/Articles/756098/ bendystraw <div class="FormattedComment"> JFS is great; it's without a doubt my favorite file system for my OS/2 cluster.<br> </div> Thu, 31 May 2018 11:51:44 +0000 lklfuse https://lwn.net/Articles/756091/ https://lwn.net/Articles/756091/ k3ninho <div class="FormattedComment"> It's heartening to know that 'those that don't learn from history end up reinventing UNIX' has moved on to reinventing what the UNIX team invented next: everything-is-a-file plus programs-are-servers is 9P and has similarities in any message-passing distributed system, notably microservices in containers.<br> <p> K3n.<br> </div> Thu, 31 May 2018 10:03:19 +0000 lklfuse https://lwn.net/Articles/756077/ https://lwn.net/Articles/756077/ dgm <div class="FormattedComment"> Funny how, the more Linux advances, the more it resembles Plan 9.<br> </div> Thu, 31 May 2018 07:55:51 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756066/ https://lwn.net/Articles/756066/ ncm <div class="FormattedComment"> The set Z for which "Zi is a pretty terrible security boundary" does not hold is small enough as to be statistically negligible. The burden of proof is on anyone asserting that some Zj is in that set.<br> <p> Sshd (with password and challenge-response authentication turned off) might be in the set. Anything not specifically designed to be in Z can safely be assumed not to be.<br> </div> Thu, 31 May 2018 01:50:06 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756065/ https://lwn.net/Articles/756065/ rahvin <div class="FormattedComment"> How would you rate JFS in comparison?<br> </div> Wed, 30 May 2018 23:39:31 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756064/ https://lwn.net/Articles/756064/ roc <div class="FormattedComment"> Would be good to know why Ted T'so said "FUSE is a pretty terrible security boundary." So far I think he hasn't explained it in the thread.<br> </div> Wed, 30 May 2018 23:16:56 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756063/ https://lwn.net/Articles/756063/ Paf <div class="FormattedComment"> That’s really a pretty big question, but as someone who works on a file system and follows related news, here’s my sense of the zeitgeist.<br> <p> I can think of three broad types worth addressing.<br> <p> For traditional extent based file systems on Linux, EXT4 and XFS are clearly best of breed. There is an emerging consensus among enterprise distributions in favor of XFS as the default, if that helps, but neither is dramatically superior in general.<br> <p> I can’t speak to log structured except to say that those are mostly built in to flash devices rather than used directly.<br> <p> For copy-on-write, there are three real choices. ZFS, almost certainly best of breed but with complex legal issues, BTRFS, which you can get various answers on the readiness of, and bcachefs which is compelling but pretty clearly still too new.<br> </div> Wed, 30 May 2018 22:30:27 +0000 lklfuse https://lwn.net/Articles/756027/ https://lwn.net/Articles/756027/ phh <div class="FormattedComment"> <font class="QuotedText">&gt; that it lacks support for many important filesystem types. </font><br> <p> On the list of supported FS by FUSE, technically there is lklfuse which makes it possible to mount any FS supported by Linux<br> I like the FUSE-only approach, because it makes the surface of attack fairly small. Then Ts'o suggestion is basically to replace FUSE with 9P. Yeah sure, whatever works I guess.<br> <p> </div> Wed, 30 May 2018 16:30:56 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756030/ https://lwn.net/Articles/756030/ rahvin <div class="FormattedComment"> Not related to the article so I apologize in advance. <br> <p> Given the advancement in older filesystems over the last few years how would those developers rate these older filesystems like JFS, XFS, ext4 and others for being the most advanced and development mind-share. It appears that XFS has the most mind share and appears to be advancing the fastest but this could be because of Redhats other efforts, I'm curious what other think.<br> <p> My concern is probably that there is a LOT of older information out there on what filesystem is best in what circumstances, etc that may no longer be relevant as a particular filesystem has seen more work than others. <br> </div> Wed, 30 May 2018 16:25:21 +0000 Unprivileged filesystem mounts, 2018 edition https://lwn.net/Articles/756026/ https://lwn.net/Articles/756026/ ms-tg <div class="FormattedComment"> Out of curiosity, does anyone know to what extent the same vector to privilege escalation attacks (allowing local non-admin users to mount a CD or USB) exist today on Mac OS or Windows?<br> <p> On Mac OS in particular, is it possible to construct a malicious .dmg file using these principles, since Mac users typically mount those disk images to install software?<br> </div> Wed, 30 May 2018 16:07:43 +0000