lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 10 Nov 2006 17:11:57 -0600
From:	Dave Kleikamp <shaggy@...ux.vnet.ibm.com>
To:	"\"Thomas B." Rücker" <dm8tbr@...npma.org>
Cc:	linux-ext4@...r.kernel.org
Subject: Re: hiding an partition and preventing to get automounted

On Fri, 2006-11-10 at 21:31 +0100, "Thomas B. Rücker" wrote:
> Short description of the situation:
> - embedded linux device running 2.4.19 montavista (Archos PMA430)
> - redesigning the firmware to as open source as possible
> - moved system partition from an loop mounted ext3 image on a fat32
> partition to a real partition.
> - device supports usb-mass-storage mode (complete hdd gets handed over
> to a usb-bridge)
> 
> Now we're trying to avoid unmounting that ext3 partition because we use
> it with unionfs to have a writeable root filesystem.
> The problem is that when the hdd is accessed via usb the operating
> system of that desktop PC might mount that ext3 partition and change it.
> What would be a clean way to hide the partition from systems accessing
> it? What would be a clean way of making it ReadOnly to those systems?
> 
> We had some ideas like using a different magic for the filesystem or a
> high and unique revision number we could patch our kernel for, but I'm
> not sure if there would be bad side effects to that. Marking the
> partition as e.g. hidden FAT16 (0x16) won't keep a linux system from
> recognizing and automounting it.
> 
> Any ideas or pointers?

Using a unique superblock magic sounds simple and is probably as
foolproof as anything.

Shaggy
-- 
David Kleikamp
IBM Linux Technology Center

-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ