Andreas Bihlmaier wrote:
> 
> Hi,
> 
> I got a quick question because I fucked up and think quite a bunch of
> other people I have read about here did as well.
> 
> I read in a couple of postings that people like to mount their root
> partition as read-only, I followed that since it prevents accidents in
> combination of 'rm' with '*' and <Return> as well as fscks of /
> 
> By accident I stumbled about the the permissions of /dev/tty* today and
> found that they get changed from
> crw-rw-rw-  1 root  wheel    5,  14 Dec 30 11:39 ttyp
> to
> crw--w----  1 user  tty    5,  14 Dec 30 12:11 ttype
> when a user has them in use (or root).
> 
> Obviously they can't get chmod/chown if / is ro, thus ripping a huge
> local security hole into the system.
> 
> Whey I mailed here is:
> Is it good practice at all to mount / read-only?
> Is it only an issue when using X?
> Am I wrong and this is no security risk? Reasons?
> 
> Regards,
> ahb
> 
> In case this is all nonsense (I didn't think it is), sorry for the noice

Hmmm, making / ro doesn't make things mounted under / ro.
Arguably, having anything writable is maybe a security hole, 
but it's hard to do anything useful otherwise.

If / is the only thingee that is read only, 
I don't think that buys anything worthwhile.
rm -rf /  still removes everything but the first level directories.

Reply via email to