View previous topic :: View next topic |
Author |
Message |
alex.blackbit Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 26 Jul 2005 Posts: 2397
|
Posted: Fri Jan 05, 2007 1:05 am Post subject: ntfs-3g in fstab as user |
|
|
hello everybody!
i used the kernel ntfs driver for a quite long time now to read data from a ntfs partition.
now i would like to use ntfs-3g to have write support.
i can do that, as root, but i would like to as a user like before.
what do i have to do to make that possible?
works: Code: | ahuemer@xeon ~ % cat /etc/fstab|grep ntfs
/dev/sdf1 /mnt/maxtor ntfs noauto,user,uid=ahuemer,gid=users 0 0
ahuemer@xeon ~ % | does not work: Code: | ahuemer@xeon ~ % cat /etc/fstab|grep ntfs
/dev/sdf1 /mnt/maxtor ntfs-3g noauto,user,uid=ahuemer,gid=users 0 0
ahuemer@xeon ~ % mount /mnt/maxtor
Error opening partition device: Permission denied
Failed to startup volume: Permission denied
Failed to mount '/dev/sdf1': Permission denied
ahuemer@xeon ~ % | thanks for your help
--alex |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
Vicchius n00b
![n00b n00b](/images/ranks/rank_rect_0.gif)
Joined: 26 Dec 2005 Posts: 12
|
Posted: Wed Jan 31, 2007 9:22 am Post subject: |
|
|
emerge ntfs3g with use flag "suid": any non-root user will be able to mount ntfs partitions but:
Quote: |
*
* You have chosen to install ntfs3g with the binary setuid root. This
* means that if there any undetected vulnerabilities in the binary,
* then local users may be able to gain root access on your machine.
*
|
|
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
irgu Tux's lil' helper
![Tux's lil' helper Tux's lil' helper](/images/ranks/rank_rect_1.gif)
Joined: 25 Apr 2003 Posts: 131
|
Posted: Wed Jan 31, 2007 8:52 pm Post subject: |
|
|
The vulnerability must be during a very narrow time window because ntfs-3g unrecoverably drops the privilege after successful mount. The user space driver always runs with the user's privilege who mounted the partition. This gives much stronger security compared to in-kernel filesytems because a security compromise is not system-wide typically. See e.g. http://projects.info-pull.com/mokb/ |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
|