Skip to main content
Tweeted twitter.com/StackSecurity/status/1480419159284621313
Became Hot Network Question
added 49 characters in body
Source Link
NewLinux
  • 735
  • 1
  • 7
  • 12

What is this restriction for in terms of safety? And when connecting external drives via USB, the root password is not required. I can't understand the logic.

I usually add it touse the following rule in the fstab to connect the internal drive at runtime:

LABEL=disk /media/user/disk ext4 rw,nosuid,nodev,noexec,discard,relatime,user 

How would such a rule add vulnerability?

What is this restriction for in terms of safety? And when connecting external drives via USB, the root password is not required. I can't understand the logic.

I usually add it to the fstab:

LABEL=disk /media/user/disk ext4 rw,nosuid,nodev,noexec,discard,relatime,user 

How would such a rule add vulnerability?

What is this restriction for in terms of safety? And when connecting external drives via USB, the root password is not required. I can't understand the logic.

I use the following rule in the fstab to connect the internal drive at runtime:

LABEL=disk /media/user/disk ext4 rw,nosuid,nodev,noexec,discard,relatime,user 

How would such a rule add vulnerability?

Source Link
NewLinux
  • 735
  • 1
  • 7
  • 12

Why do I need the root password when mounting an internal drive in Linux?

What is this restriction for in terms of safety? And when connecting external drives via USB, the root password is not required. I can't understand the logic.

I usually add it to the fstab:

LABEL=disk /media/user/disk ext4 rw,nosuid,nodev,noexec,discard,relatime,user 

How would such a rule add vulnerability?