Hi,

I got a quick question because I fucked up and think quite a bunch of
other people I have read about here did as well.

I read in a couple of postings that people like to mount their root
partition as read-only, I followed that since it prevents accidents in
combination of 'rm' with '*' and <Return> as well as fscks of /

By accident I stumbled about the the permissions of /dev/tty* today and
found that they get changed from
crw-rw-rw-  1 root  wheel    5,  14 Dec 30 11:39 ttyp
to
crw--w----  1 user  tty    5,  14 Dec 30 12:11 ttype
when a user has them in use (or root).

Obviously they can't get chmod/chown if / is ro, thus ripping a huge
local security hole into the system.

Whey I mailed here is:
Is it good practice at all to mount / read-only?
Is it only an issue when using X?
Am I wrong and this is no security risk? Reasons?

Regards,
ahb

In case this is all nonsense (I didn't think it is), sorry for the noice

Reply via email to