lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 24 Oct 2007 20:10:16 +0200
From:	"Bram Neijt" <bneijt@...il.com>
To:	linux-ext4@...r.kernel.org
Subject: User permissions or UID/GIDs for portable disks?

Dear ext4 developers,

Currently using ext3 on an usbstick seems to have a few drawbacks.
Consider the following situations:
1. Lend my usbstick to a college at work, but I don't want them to be
able to place files on it which I can't delete at work (where I don't
have root access).
2. Lend my usbstick to a friend and ask him/her to put another large
file on it before returning it.

One of the best solutions I can come up with is if the filesystem
would allow for a switch that would help ignore these permissions as
part of the filesystem. Any other solution would either require
specialized userspace solutions (which would probably make any
unpluggable usb device unsecure) or special options while mounting.
The latter would require root privileges and the UUID (for exmple)
would have to be known in advance.

Although using vfat is a solution, I would love to hear wether this is
considered a possible problem and wether it could be implementable at
a filesystem level?

I would be happy to discuss any and all possible solutions to these problems.

Greetings,
  Bram

PS The only reason I don't want to use vfat is because I _think_ it's
old and don't think it's _cooool_.
-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ