Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
ntfs-3g in fstab as user
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index Kernel & Hardware
View previous topic :: View next topic  
Author Message
alex.blackbit
Advocate
Advocate


Joined: 26 Jul 2005
Posts: 2397

PostPosted: Fri Jan 05, 2007 1:05 am    Post subject: ntfs-3g in fstab as user Reply with quote

hello everybody!

i used the kernel ntfs driver for a quite long time now to read data from a ntfs partition.
now i would like to use ntfs-3g to have write support.
i can do that, as root, but i would like to as a user like before.
what do i have to do to make that possible?
works:
Code:
ahuemer@xeon ~ % cat /etc/fstab|grep ntfs
/dev/sdf1               /mnt/maxtor     ntfs            noauto,user,uid=ahuemer,gid=users       0 0
ahuemer@xeon ~ %
does not work:
Code:
ahuemer@xeon ~ % cat /etc/fstab|grep ntfs
/dev/sdf1               /mnt/maxtor     ntfs-3g         noauto,user,uid=ahuemer,gid=users       0 0
ahuemer@xeon ~ % mount /mnt/maxtor
Error opening partition device: Permission denied
Failed to startup volume: Permission denied
Failed to mount '/dev/sdf1': Permission denied
ahuemer@xeon ~ %
thanks for your help
--alex
Back to top
View user's profile Send private message
Vicchius
n00b
n00b


Joined: 26 Dec 2005
Posts: 12

PostPosted: Wed Jan 31, 2007 9:22 am    Post subject: Reply with quote

emerge ntfs3g with use flag "suid": any non-root user will be able to mount ntfs partitions but:

Quote:

*
* You have chosen to install ntfs3g with the binary setuid root. This
* means that if there any undetected vulnerabilities in the binary,
* then local users may be able to gain root access on your machine.
*
Back to top
View user's profile Send private message
irgu
Tux's lil' helper
Tux's lil' helper


Joined: 25 Apr 2003
Posts: 131

PostPosted: Wed Jan 31, 2007 8:52 pm    Post subject: Reply with quote

The vulnerability must be during a very narrow time window because ntfs-3g unrecoverably drops the privilege after successful mount. The user space driver always runs with the user's privilege who mounted the partition. This gives much stronger security compared to in-kernel filesytems because a security compromise is not system-wide typically. See e.g. http://projects.info-pull.com/mokb/
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index Kernel & Hardware All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum