Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1864448rwb; Mon, 7 Nov 2022 06:41:40 -0800 (PST) X-Google-Smtp-Source: AMsMyM582eKrYID93tSNSxeQ34tFiHVS268pUmxuJqE9WX3NwP3eG2fZze8kSm0Rwpi6Tf63v8gJ X-Received: by 2002:a05:6a00:b4f:b0:56d:a232:6da7 with SMTP id p15-20020a056a000b4f00b0056da2326da7mr37512957pfo.22.1667832100546; Mon, 07 Nov 2022 06:41:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667832100; cv=none; d=google.com; s=arc-20160816; b=CpWLvY3c3pNwKA+lIDZx6uAioLMn7vI/vj69U+IhPPdNwlNrh69RctNJ4LJtD78+Si f5MmrN36JgExA4tPdDIzk0JHuutvegL6/1VLT0etmrQX1M1kbpSrkADAoqfXHMUGoJTc LeGNV8SiFp2Fej/4C+VBpOL2ZxWHwzOjlmeurLhDF5iGseNSWt0tPdJmEETk6xeM+Q2a vBA9P43NGUrGVLRvma88QOhHm3dpsOSEPycosFtkwW39tXUm4wOPVzHWn6gomEXlu6Ue YKSswwINZUBDbbJQyYuCKvq45MdtX4+GJF/ub+QCU/ZX+qHHChjpr5BAfW58jBxp7DXj VtEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=PM+GvzUOrpzLT7Pau7GHi0eg8fby8y8JxEhzd+k4CsQ=; b=OrTy4wZto0tiC2gPVk/C+7SVcLY4u1aSKpjojvL67infctN5GwCv8QVFfJ2+It2CoT S1qcbJHk6iR2pmkDyxMzmaCBtM32Rp9kh50D3m/RVFCw5ScWvPebJxnx+Jkw/hsXmllX f/iGaN0Re9FZQUYvKuE4tsUhZGEfRVFyUrNyBc2qU4cXo3J9pd6wprg1khNNw8OLQfi0 W/EnctbSyOKVrjZlToFPnMgozFpi4JKhLPH+p22VKbD4hMeDZPor4OjdZwzWnY/iU1g4 zwtIX4UNoq9bQqADWKShHV2Zci0hV10oyHF0nQ75a3ZS6PD2keDDJXYVP7WaopYTzQFo /8KA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@szeredi.hu header.s=google header.b=VTrxRNeP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=szeredi.hu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 134-20020a63018c000000b0046fcf7ac293si10118510pgb.767.2022.11.07.06.41.27; Mon, 07 Nov 2022 06:41:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@szeredi.hu header.s=google header.b=VTrxRNeP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=szeredi.hu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231601AbiKGNaL (ORCPT + 93 others); Mon, 7 Nov 2022 08:30:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60570 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232077AbiKGN3x (ORCPT ); Mon, 7 Nov 2022 08:29:53 -0500 Received: from mail-ej1-x634.google.com (mail-ej1-x634.google.com [IPv6:2a00:1450:4864:20::634]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 672501D302 for ; Mon, 7 Nov 2022 05:29:42 -0800 (PST) Received: by mail-ej1-x634.google.com with SMTP id k2so30131479ejr.2 for ; Mon, 07 Nov 2022 05:29:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=szeredi.hu; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=PM+GvzUOrpzLT7Pau7GHi0eg8fby8y8JxEhzd+k4CsQ=; b=VTrxRNePenGfST2wcxSrNrVGneCGqAxict2RxEPTu4I4YlZxOZQdbWtyBocBb/05PP dzu01Yv75KglfeLY5TfGFVCM/E1b/ZjSI7UAA5mmeGJ3KDyxXn1/rn5N2WVoPfQ1WDo1 m1OENUtHehsnS59tJWyVD52Kv066ZBa0iCPCE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=PM+GvzUOrpzLT7Pau7GHi0eg8fby8y8JxEhzd+k4CsQ=; b=6445+Ss/IAR6UHZkUDQR/KfUMd4mSIOJbA1hddx7ZcRM7oQ0qqBOwrF1NDnQP8Xh1/ pnsVby4BigcMYRtQTu+veNbH3rgZd3Qq7zMiidNDDdYSOaJY8KSQ2u4EGbcjt7hkB5/w +TG2cvMsT6UloHr5uB9rajQF89E/Wtq/XRDB6bwW/CoV7WSAm9wozXk1g1sXc10MMom8 pr/7D0voXBpKauIehfcBZcDA+NTX6p22nTR2BtLlK0o8C7Fwce1KWEj74Ab8z5VQcNr/ qPCXhE010XJnQo8R/UK3uvO0nvfyayghMYnqWn3Oj4A994nk9F7PCNG5N0VKhonShTK4 +ruA== X-Gm-Message-State: ACrzQf2ej4tc41ScIXI2voaw0wbGLH64Y/iuiRieA+Z2Ex9D+5rUrdJt e62EVL1d6+WByKEBKQsLlKeXuP4Z4/2lOfRLMoVW6g== X-Received: by 2002:a17:906:371a:b0:7ad:c01c:6fa0 with SMTP id d26-20020a170906371a00b007adc01c6fa0mr43776661ejc.267.1667827781033; Mon, 07 Nov 2022 05:29:41 -0800 (PST) MIME-Version: 1.0 References: <20221016170046.171936-1-work.viveris@nightmared.fr> In-Reply-To: <20221016170046.171936-1-work.viveris@nightmared.fr> From: Miklos Szeredi Date: Mon, 7 Nov 2022 14:29:29 +0100 Message-ID: Subject: Re: [PATCH] fuse: enable unprivileged mounts for fuseblk To: Simon Thoby Cc: CONZELMANN Francois , "Eric W . Biederman" , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 16 Oct 2022 at 19:00, Simon Thoby wrote: > > Commit 4ad769f3c346ec3d458e255548dec26ca5284cf6 ("fuse: Allow fully > unprivileged mounts") enabled mounting filesystems with the 'fuse' type for > any user with CAP_SYS_ADMIN inside their respective user namespace, but did > not do so for the 'fuseblk' filesystem type. > > Some FUSE filesystems implementations - like ntfs-3g - prefer using > 'fuseblk' over 'fuse', which imply unprivileged users could not use these > tools - in their "out-of-the-box" configuration, as these tools can always > be patched to use the 'fuse' filesystem type to circumvent the problem. > > Enable unprivileged mounts for the 'fuseblk' type, thus uniformizing the > behavior of the two FUSE filesystem types. > > Signed-off-by: Simon Thoby NAK in this form. Please look at all the places where there's a difference between the fuse and the fuseblk behavior and give proof that they won't result in a security issue in case fuseblk is mounted unprivileged. As a possibly much better alternative, try modifying the ntfs-3g code to be able to work using the "fuse" fs type as well. Thanks, Miklos fuseblk enables synchronouse RELEASE and DESTROY requests that are unsuitable for unprivileged operation. Thanks, Miklos