<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: mount options in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895412#M740355</link>
    <description>Thanks Henk,&lt;BR /&gt;&lt;BR /&gt;so it's verified now :(&lt;BR /&gt;I hadn't come upon that thread - I'll leave the current open for a few days, I'd like to hear the consensus about these options, maybe I'll open a call for a change request. That would surely take a year or so, but one gains a lot of additional security from it, at least in my personal opinion.</description>
    <pubDate>Sun, 10 Apr 2005 16:37:16 GMT</pubDate>
    <dc:creator>Florian Heigl (new acc)</dc:creator>
    <dc:date>2005-04-10T16:37:16Z</dc:date>
    <item>
      <title>mount options</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895410#M740353</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;does anyone know the reason why HP didn't include the noexec and nodev options to mount -Fvxfs?&lt;BR /&gt;Those are really desirable for i.e. /tmp or /home&lt;BR /&gt;&lt;BR /&gt;At least it would appear that they are missing - maybe I'm just blind.</description>
      <pubDate>Sun, 10 Apr 2005 07:14:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895410#M740353</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-04-10T07:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: mount options</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895411#M740354</link>
      <description>you're not blind .&lt;BR /&gt;there are no such options, don't know why not&lt;BR /&gt;did you find his thread?&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=73047" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=73047&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;regards.</description>
      <pubDate>Sun, 10 Apr 2005 14:12:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895411#M740354</guid>
      <dc:creator>Henk Geurts</dc:creator>
      <dc:date>2005-04-10T14:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: mount options</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895412#M740355</link>
      <description>Thanks Henk,&lt;BR /&gt;&lt;BR /&gt;so it's verified now :(&lt;BR /&gt;I hadn't come upon that thread - I'll leave the current open for a few days, I'd like to hear the consensus about these options, maybe I'll open a call for a change request. That would surely take a year or so, but one gains a lot of additional security from it, at least in my personal opinion.</description>
      <pubDate>Sun, 10 Apr 2005 16:37:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895412#M740355</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-04-10T16:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: mount options</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895413#M740356</link>
      <description>I doubt that those options really add that much to the security of the system. At best, they limit the scope of the routine searches that your security scripts have to examine. The problem is that it is not unheard of to create temporary device files (especially named pipes) and temporary executable files. For example, I often have scripts that write scripts "on the fly" and execute them and then remove them.&lt;BR /&gt;</description>
      <pubDate>Sun, 10 Apr 2005 19:43:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895413#M740356</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2005-04-10T19:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: mount options</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895414#M740357</link>
      <description>I'd read a quite interesting thread about these options in an apache mailinglist a few months ago - one suscriber had a 'visit' on his box - they exploited an at that time not widely known problem with apache 2.0.52 and uploaded some scripts to /tmp - due to the noexec flag, the weren't able to run them. &lt;BR /&gt;&lt;BR /&gt;(they continued in apache's shared memory area, but at least the filesystems were kept clean)&lt;BR /&gt;&lt;BR /&gt;While I'd say Apache like every other internet daemon should always be chrooted and not listening an a priveleged port, limiting the world-writable places further in permissions doesn't appear such a bad idea to me.&lt;BR /&gt;&lt;BR /&gt;I've enabled this flag where possible and didn't really run into big problems. (one has to keep it in mind anyway, which some might find too much risk)</description>
      <pubDate>Mon, 11 Apr 2005 07:29:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895414#M740357</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-04-11T07:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: mount options</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895415#M740358</link>
      <description>I'll close the thread now, I think this *is* a security feature as it will stop people from executing things where they shouldn't before it's too late and You need to start doing forensics.&lt;BR /&gt;&lt;BR /&gt;on the other hand I'm only the second person to ask, so I'll close the thread due as this is obviously not a critical issue to the majority.&lt;BR /&gt;&lt;BR /&gt;I'll dig into achiving a similar solution on acl-basis by leaving /tmp with permissions of 1777 but disabling file execution for all users but root in there.&lt;BR /&gt;&lt;BR /&gt;or maybe I'll just chroot away some more services ;)</description>
      <pubDate>Sat, 16 Apr 2005 16:15:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895415#M740358</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-04-16T16:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: mount options</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895416#M740359</link>
      <description>For the record, this seems not achievable using ACLs, there seems not to be inheritance from directory to newly created files.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=998812" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=998812&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 07 Feb 2006 18:12:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/mount-options/m-p/4895416#M740359</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2006-02-07T18:12:56Z</dc:date>
    </item>
  </channel>
</rss>

