I have to agree with Klaus Knopper. This is ridiculous. Just because you 
think internalizing the library would 
be insecure, all the users are forced to write C wrappers or compile their 
own ntfs-3g, which bosth will in effect be WAY LESS SECURE, because of the 
very reasons you are trying to avoid:

1) People will inexperiencedly "make it work". They are mostly worse than 
you at keeping things secure. You can tell yourself that it wasn't you, 
but it was you who made the people fix the problem you created by shipping 
a broken ntfs-3g.

2) Homebuild ntfs-3g versions aren't updated with the system, leaving the 
system to be vulnerable after fuse's bugs are patched in the repository.

3) Wrappers will tear holes because they cause security checks in ntfs-3g 
to be skipped, and they will possibly tear open all the holes you are 
also trying to keep shut.


Here is my suid wrapper, just to eliminate any doubt that YOUR 
NON-SOLUTION of this bug WILL CREATE SECURITY RISKS for every user:

#include <stdlib.h>
#include <string.h>
int main(int argc, char* argv[]){
        char* prog = malloc(strlen(argv[0])+5);
        strcpy(prog, argv[0]);
        strcat(prog, ".bin");
        int uid=geteuid();
        setuid(uid);
        execvp(prog, argv);
        exit(127);
}

I'd bet you can find a security risk there besides the fact that it 
eliminates the ntfs-3g security checks and alters the defaults.

PS: I don't have any USB drives in /etc/fstab.

My version of Debian:
deb cdrom:[Debian GNU/Linux 7.3.0 _Wheezy_ - Official amd64 NETINST 
Binary-1 20131215-04:55]/ wheezy main


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to