lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4554E1B4.3050508@openpma.org>
Date:	Fri, 10 Nov 2006 21:31:48 +0100
From:	"Thomas B. Rücker" <dm8tbr@...npma.org>
To:	linux-ext4@...r.kernel.org
Subject: hiding an partition and preventing to get automounted

Short description of the situation:
- embedded linux device running 2.4.19 montavista (Archos PMA430)
- redesigning the firmware to as open source as possible
- moved system partition from an loop mounted ext3 image on a fat32
partition to a real partition.
- device supports usb-mass-storage mode (complete hdd gets handed over
to a usb-bridge)

Now we're trying to avoid unmounting that ext3 partition because we use
it with unionfs to have a writeable root filesystem.
The problem is that when the hdd is accessed via usb the operating
system of that desktop PC might mount that ext3 partition and change it.
What would be a clean way to hide the partition from systems accessing
it? What would be a clean way of making it ReadOnly to those systems?

We had some ideas like using a different magic for the filesystem or a
high and unique revision number we could patch our kernel for, but I'm
not sure if there would be bad side effects to that. Marking the
partition as e.g. hidden FAT16 (0x16) won't keep a linux system from
recognizing and automounting it.

Any ideas or pointers?

TIA & Cheers

Thomas B. Rücker

www.openpma.org
-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ