On Sun, Feb 6, 2011 at 9:58 PM,  <sf...@users.sourceforge.net> wrote:
>
> How about writing a wrapper?
> Allow chown after some tests.
> - the target path is aufs, or /home/$USER in your case?
> - the target uid is $USER
> - etc
> The warpper may be implemented suid-ed, or customized /etc/sudoers.
>

I can do that easily and it would only work for a single-user desktop
with one user logged in.  If there is more than one simultaneous user,
or if the ro branch is located on a server that is sharing with a
protocol that doesn't have UID/GID override support (like NFS) then
this method doesn't really function.

There is also the problem of not wanting to trust users with shared
executables that they can write to.  As Wine becomes more compatible
with Windows it will be more vulnerable to malware and the separation
of rw data between users is crucial.  Allowing them to chown means
that anything can be written to the files from their account and the
users of other accounts will be executing (and possibly writing to)
the same files..

> You may want to try fuse, nfs or any other fs which has uid-mapping
> feature.
> After some considerations, I could understand why you want such feature
> in aufs. But as I wrote first, I don't think it is a feature of
> stackable filesystem. Aufs should follow and should not disturb the
> native behaviour of brach fs.
>

I did look into funionfs but it had a lot of bugs and development
stopped back in 2005 pending a rewrite.

I reported a bug about the problem with SMB/CIFS mounts being
displayed in Nautilus even if the mount point is a hidden directory
but the initial response wasn't enthusiastic:
https://bugzilla.gnome.org/show_bug.cgi?id=641569

I understand your position.  A filesystem that does nothing more than
change UID/GID/ACLS/permissions would be perfect but I don't know of
any.  Seems like it would be a great feature for a rootkit :D  I'll
keep looking for other solutions.

------------------------------------------------------------------------------
The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE:
Pinpoint memory and threading errors before they happen.
Find and fix more than 250 security defects in the development cycle.
Locate bottlenecks in serial and parallel code that limit performance.
http://p.sf.net/sfu/intel-dev2devfeb

Reply via email to