[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: at-boot smbmount security.



On Mon, 13 Aug 2001, Nadav Har'El wrote:

> My /etc/fstab has always been root-only readable, and I never saw any
> problem.

never tried, but logic tells me a command like "mv" will need to know
the partition structure from somewhere to know if it is doing
copy-unlink or jusr relink. then again, I suppose that info is available
from /proc if the programmer knows his job.

but yes, KDE likes (u)mounting floppies and CDROM drives itself. so that
is not a solution.

the problem of invading a file server, be it NFS, Novel or W2K should be
about the same. if you connect from a station, you do it during the
login, not boot-up. if it's a server, there should be some public key
system, but that's a bit less secure than entering a password each time
and then removing it from memory, as the keys are permanent on the disk.

-- 
Please recycle
Ira Abramov


=================================================================
To unsubscribe, send mail to linux-il-request@linux.org.il with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail linux-il-request@linux.org.il