On Fri, 25 Jun 2004, Mike Waychison wrote:

This is just semantically racy. If someone ssh'es into you laptop and accesses the mount before you do, you can't access it. A better approach IMHO is to mount with the UID of the user on :0, unmounting it on logout if possible. Thoughts?

Why should the user on :0 be special?

This is a question of policy. And there are really two questions here. The important one:

- Does the user have the credentials to be allowed to mount this device?

we already have things like pam_console and logindevperm to assist with answering this question, if an admin so desires.

The lesser question of, applying mainly to removable media with certain non-POSIX fs's:

- what credentials should the mount apply to files?

The answer to last one, given you have an answer to first question, is almost certainly "the credentials which triggered the mount".

no?

regards,
--
Paul Jakma      [EMAIL PROTECTED]       [EMAIL PROTECTED]       Key ID: 64A2FF6A
        warning: do not ever send email to [EMAIL PROTECTED]
Fortune:
Live fast, die young, and leave a flat patch of fur on the highway!
                -- The Squirrels' Motto (The "Hell's Angels of Nature")

_______________________________________________
autofs mailing list
[EMAIL PROTECTED]
http://linux.kernel.org/mailman/listinfo/autofs

Reply via email to