On Wed, 19 Oct 2005, Roman Rodyakin wrote:

> On Wed, Oct 19, 2005 at 08:44:49AM +0200, Otto Moerbeek wrote:
> > 
> > On Wed, 19 Oct 2005, Roman Rodyakin wrote:
> > 
> > > I have been recently thinking about trade-offs involved in running
> > > servers at the securelevel 2.  In securelevel 2, it is possible to mount
> > > a MFS over an arbitrary disk directory and create arbitrary files in it,
> > > including those that have system immutable flags set in the original
> > > (disk) filesystem.  This would essentially allow an attacker to
> > > circumvent the system immutable flag until the reboot.
> > > 
> > > My question is then this: what is the rationale, if any, for allowing
> > > mount_mfs in securelevel 2?  
> > > 
> > > Not that it is a big deal (as MFS can be disabled in the kernel IIRC), I
> > > am just wondering if I am perhaps misunderstanding the concept of
> > > securelevel and protections allowed by it.
> > > 
> > > I searched both mailing list archives and Google, but couldn't find
> > > anything relevant.  Feel free to point me to earlier discussions on the
> > > subject, if there were any.
> > 
> > Mounting in general is allowed, so why should mount_mfs be disallowed?
> 
> Correct me if I'm wrong, but I thought that, unlike most other mount_XXX
> commands, mount_mfs not only mounts a filesystem, but also creates it,
> essentially also doing what newfs does on a disk partition.  newfs,
> however, fails in securelevel 2.

So you prepare the image somewhere else and transfer it.

> That said, I can totally see your point though, as singling out one file
> system type and disabling mounting it can certainly be viewed as
> inconsistent.

        -Otto

Reply via email to