Michele Calgaro via tde-users wrote: > Is that even possible? systemd reads fstab entry on boots and when > manually instructed to do so and use fstab information when a disk needs > to be mounted, regardless of whether you use mount, udisks, udisks2 or > other mounting methods. As I also mentioned in my previous email, if a > standard users could bypass fstab permissions so easily, it would be a > security issue. > > Again, if I said something wrong or I am missing some info, happy to hear > about it. May be I was mistaken, but when reading udisks docs, I saw an option for the mount command. Now looking again, I think it was the mount options for udisks in the configuration file. https://storaged.org/doc/udisks2-api/latest/mount_options.html I do not have much time ATM to look into it in details though. As far as I understand the problem Roman addressed, it is that TDE bypasses udisks if there is fstab entry for the device, while the correct behavior would be to see if udisks is allowed to handle the device, because udisks itself honours fstab. But this is just my understanding and hypothesis for now. In the docs of udisks it says it uses fstab and its config file. Both are managed by root only, so it is for the root user to decide what the user can do. ____________________________________________________ tde-users mailing list -- users@xxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxx Web mail archive available at https://mail.trinitydesktop.org/mailman3/hyperkitty/list/users@xxxxxxxxxxxxxxxxxx