Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261852AbVD1IkG (ORCPT ); Thu, 28 Apr 2005 04:40:06 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261154AbVD1IhI (ORCPT ); Thu, 28 Apr 2005 04:37:08 -0400 Received: from rev.193.226.232.93.euroweb.hu ([193.226.232.93]:18088 "EHLO dorka.pomaz.szeredi.hu") by vger.kernel.org with ESMTP id S261862AbVD1I3j (ORCPT ); Thu, 28 Apr 2005 04:29:39 -0400 To: pavel@ucw.cz CC: trond.myklebust@fys.uio.no, bulb@ucw.cz, hch@infradead.org, jamie@shareable.org, linuxram@us.ibm.com, 7eggert@gmx.de, viro@parcelfarce.linux.theplanet.co.uk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, akpm@osdl.org In-reply-to: <20050428082444.GK1906@elf.ucw.cz> (message from Pavel Machek on Thu, 28 Apr 2005 10:24:44 +0200) Subject: Re: [PATCH] private mounts References: <20050426201411.GA20109@elf.ucw.cz> <20050427092450.GB1819@elf.ucw.cz> <20050427115754.GA8981@vagabond> <20050427123944.GA11020@vagabond> <20050427145842.GD28119@elf.ucw.cz> <1114644116.9947.14.camel@lade.trondhjem.org> <20050428082444.GK1906@elf.ucw.cz> Message-Id: From: Miklos Szeredi Date: Thu, 28 Apr 2005 10:28:50 +0200 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 631 Lines: 15 > > The NFS security model is based on the principle that the administrator > > of the SERVER can override access permissions on his/her hardware. Pray > > tell why you think that is "broken"? > > Well, administrator on CLIENT can impersonate whoever he wants, Not really. Root squash has the very important effect that whatever the client does, it cannot impersonate "root". Miklos - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/