[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: at-boot smbmount security.
- To: IGLU Mailing list <linux-il(at-nospam)iglu.org.il>
- Subject: Re: at-boot smbmount security.
- From: Ira Abramov <lists-linux-il(at-nospam)ira.scso.com>
- Date: Tue, 14 Aug 2001 10:40:33 +0300 (IDT)
- Delivered-To: iglu.org.il-linux-il@iglu.org.il
- In-Reply-To: <20010813100123.A6592@leeor.math.technion.ac.il>
- Sender: linux-il-bounce(at-nospam)cs.huji.ac.il
On Mon, 13 Aug 2001, Nadav Har'El wrote:
> My /etc/fstab has always been root-only readable, and I never saw any
> problem.
never tried, but logic tells me a command like "mv" will need to know
the partition structure from somewhere to know if it is doing
copy-unlink or jusr relink. then again, I suppose that info is available
from /proc if the programmer knows his job.
but yes, KDE likes (u)mounting floppies and CDROM drives itself. so that
is not a solution.
the problem of invading a file server, be it NFS, Novel or W2K should be
about the same. if you connect from a station, you do it during the
login, not boot-up. if it's a server, there should be some public key
system, but that's a bit less secure than entering a password each time
and then removing it from memory, as the keys are permanent on the disk.
--
Please recycle
Ira Abramov
=================================================================
To unsubscribe, send mail to linux-il-request@linux.org.il with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail linux-il-request@linux.org.il