Re: fmount system call

Volker.Lendecke (lendecke@math.uni-goettingen.de)
Thu, 24 Jul 1997 14:20:29 +0200


-----BEGIN PGP SIGNED MESSAGE-----

> Hmmm. AFAIK, this comes from smbmount and ncpmount being setuid-root,
> which in turn comes from mount(2) requiring root privileges.

Correct.

> Maybe
> this restriction could be relaxed with some additional VFS protocol,
> like adding a per-fs function verify_credentials. So the actual mount

Hmm. For my taste this puts too many decisions into the kernel. I'm
currently trying to take as much as possible out of smbfs and
ncpfs. For example, encrypted login to a smb share will be done in
user space. For a first attempt, look at
ftp://ftp.gwdg.de/pub/linux/misc/smbfs/dontuse/smbfs-2.1.0.tgz. With
fmount, you can do all this safely in user space. I do not think that
setuid programs are necessarily a bad thing.

Volker

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM9dIDj/9BWnmOc5FAQEDtwQAmv1zZMbeumcfaa5Rud5pUIDUt+HCl8Iu
h/6JmL+pMpx8/oLvyqI1XBbS1HM/3zXhLMVI/ADqWKz4pADtlgoOP99hU+pKiMxO
PxK60beXu5CZPxcNO3M2zMls0zfiD16HPgzppGI2cprOC6YHxxoGJh18MrZed4l5
Lvbt3yagPbk=
=lxda
-----END PGP SIGNATURE-----