docs/115981: nodev mount option should be removed from documentation
Craig Rodrigues
rodrigc at FreeBSD.org
Fri Aug 31 19:10:02 UTC 2007
>Number: 115981
>Category: docs
>Synopsis: nodev mount option should be removed from documentation
>Confidential: no
>Severity: serious
>Priority: high
>Responsible: freebsd-doc
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: doc-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Aug 31 19:10:02 GMT 2007
>Closed-Date:
>Last-Modified:
>Originator: Craig Rodrigues
>Release: FreeBSD CURRENT
>Organization:
>Environment:
>Description:
The "nodev" and "dev" mount options have been no-ops that
have been silently ignored since FreeBSD 5, due to the introduction
of devfs.
In FreeBSD 7, if a user has these options in /etc/fstab,
or does "mount -o nodev", it will result in a mount error,
and that particular mount operation should fail.
>How-To-Repeat:
>Fix:
Remove all references to "nodev" mount option in documentation.
Patch attached with submission follows:
Index: articles/hubs/article.sgml
===================================================================
RCS file: /home/ncvs/doc/en_US.ISO8859-1/articles/hubs/article.sgml,v
retrieving revision 1.64
diff -u -r1.64 article.sgml
--- articles/hubs/article.sgml 30 Jun 2007 09:42:35 -0000 1.64
+++ articles/hubs/article.sgml 31 Aug 2007 18:57:09 -0000
@@ -379,7 +379,7 @@
Here is an excerpt from <filename>/etc/fstab</filename>,
how to set up such a MFS:
<programlisting>
-/dev/da0s1b /anoncvstmp mfs rw,-s=786432,-b=4096,-f=512,-i=560,-c=3,-m=0,nosuid,nodev 0 0
+/dev/da0s1b /anoncvstmp mfs rw,-s=786432,-b=4096,-f=512,-i=560,-c=3,-m=0,nosuid 0 0
</programlisting>
This is (of course) tuned a lot, and was suggested by &a.jdp;.
</para>
Index: books/handbook/basics/chapter.sgml
===================================================================
RCS file: /home/ncvs/doc/en_US.ISO8859-1/books/handbook/basics/chapter.sgml,v
retrieving revision 1.148
diff -u -r1.148 chapter.sgml
--- books/handbook/basics/chapter.sgml 6 Jul 2007 07:29:55 -0000 1.148
+++ books/handbook/basics/chapter.sgml 31 Aug 2007 18:57:52 -0000
@@ -1630,15 +1630,6 @@
<variablelist>
<varlistentry>
- <term>nodev</term>
-
- <listitem>
- <para>Do not interpret special devices on the
- file system. This is a useful security option.</para>
- </listitem>
- </varlistentry>
-
- <varlistentry>
<term>noexec</term>
<listitem>
Index: books/handbook/security/chapter.sgml
===================================================================
RCS file: /home/ncvs/doc/en_US.ISO8859-1/books/handbook/security/chapter.sgml,v
retrieving revision 1.313
diff -u -r1.313 chapter.sgml
--- books/handbook/security/chapter.sgml 5 Jul 2007 11:00:48 -0000 1.313
+++ books/handbook/security/chapter.sgml 31 Aug 2007 18:59:07 -0000
@@ -712,9 +712,8 @@
<para>If you have a huge amount of user disk space, it may take too
long to run through every file on those partitions. In this case,
- setting mount flags to disallow suid binaries and devices on those
- partitions is a good idea. The <literal>nodev</literal> and
- <literal>nosuid</literal> options (see &man.mount.8;) are what you
+ setting mount flags to disallow suid binaries is a good idea.
+ The <literal>nosuid</literal> option (see &man.mount.8;) is what you
want to look into. You should probably scan them anyway, at least
once a week, since the object of this layer is to detect a break-in
attempt, whether or not the attempt succeeds.</para>
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-doc
mailing list