Hello guys !
The questions I posed in these mounths was fundamentally addressed to understand the permission setting, how to set owners and groups to manage a device drive and how to mount them in Unix/Unix-like O.S.. Everything with particular regard to a strict security policy: the aim of my questions were to investigate if there was leaks that (in some way) give to an external event the possibility to corrupt the metadata of the files stored on a storage device (usb flash thumb sticks, sata/ide hard disks).
The topics have been analized at user level.
Please, let me try to see the problem at kernel level.
As you taught me, there are several configuration files of the FreeBSD that are take into account during the boot process, to set the numerous and several resources of a workstation.
In one of my latest posts, for example, we discussed about the /etc/devfs.rules file. It is a system file, read at boot time to set some hardware actions.
QUESTION.
Which way does the boot process execute these files ? That is: if I set one of these files in read-only, is the file processed anyway during the boot process ? or not ?
Again, in other words, to avoid confusion: if I've well understood, during the boot process the configuration files are executed by the loader of the O.S. Has the loader or not preferential permissions over the configuration files ?
The same question is extended to the demons, because they run in real time during the normal O.S activity.
Can one of them take the control of an attached drive and corrupt its metadata ?
Thanks in advance.
See you.
The questions I posed in these mounths was fundamentally addressed to understand the permission setting, how to set owners and groups to manage a device drive and how to mount them in Unix/Unix-like O.S.. Everything with particular regard to a strict security policy: the aim of my questions were to investigate if there was leaks that (in some way) give to an external event the possibility to corrupt the metadata of the files stored on a storage device (usb flash thumb sticks, sata/ide hard disks).
The topics have been analized at user level.
Please, let me try to see the problem at kernel level.
As you taught me, there are several configuration files of the FreeBSD that are take into account during the boot process, to set the numerous and several resources of a workstation.
In one of my latest posts, for example, we discussed about the /etc/devfs.rules file. It is a system file, read at boot time to set some hardware actions.
QUESTION.
Which way does the boot process execute these files ? That is: if I set one of these files in read-only, is the file processed anyway during the boot process ? or not ?
Again, in other words, to avoid confusion: if I've well understood, during the boot process the configuration files are executed by the loader of the O.S. Has the loader or not preferential permissions over the configuration files ?
The same question is extended to the demons, because they run in real time during the normal O.S activity.
Can one of them take the control of an attached drive and corrupt its metadata ?
Thanks in advance.
See you.