Open birdie-github opened 5 years ago
Is this project alive?
Is this project alive?
Yup. :) Sorry, I totally missed your issue. (you should have shouted sooner :wink:)
The rules are there to prevent desktop users from accidentally destroying their UEFI boot drives (both internal and external). Why do you need to use udisks to mount such partitions? Modifications of such data should be done by somebody with admin privileges.
It would be great if udisks supported much better configuration options (like enable_mounting_uefi = true
), but then again, that would be in a root-owned configuration file.
The UDISKS_IGNORE
udev property only affects the HitIgnore
property in the UDisks API. You can still mount "ignored" devices using UDisks API or udisksctl. The HintIgnore
is used by GNOME/GVfs (and other GUI tools) to decided whether to show the device in the UI. We can change this for some devices (but I think it makes sense to hide EFI partitions) but this shouldn't be decided by us, but by GNOME and other users of the "ignore API".
The rules are there to prevent desktop users from accidentally destroying their UEFI boot drives (both internal and external). Why do you need to use udisks to mount such partitions? Modifications of such data should be done by somebody with admin privileges.
It would be great if udisks supported much better configuration options (like
enable_mounting_uefi = true
), but then again, that would be in a root-owned configuration file.
Maybe you're right. But it would be great to have an option to remove this limitation. E.g, a user might want to create (1) and populate (2) a UEFI system partition - currently it (2) can't be done unless you use sudo all the time.
Maybe you're right. But it would be great to have an option to remove this limitation. E.g, a user might want to create (1) and populate (2) a UEFI system partition - currently it (2) can't be done unless you use sudo all the time.
Well this is a two-fold problem. While I understand this is useful for USB stick ISO writers and similar tools, managing EFI partitions on removable media can be a security issue in fact. This is actually difficult to distinguish as long as it's possible to have EFI partition on a device that is classified as removable (USB stick, (e)MMC or SD cards, etc.) and the partition doesn't need to be mounted (e.g. /boot/efi
) even if the system was actually booted from it. And we don't want regular users be able to destroy the system on some embedded or kiosk installations. Sadly the principle of seatings wouldn't help to distinguish things here.
I think this question deserves further evaluation - would be good to evaluate drive classifications on non-standard connections - eMMC, USB drives containing an OS (or several installations), etc.
Could you perhaps describe your use case a little bit more? I still do think any tools modifying system data even on removable devices should require proper authorization.
I've discovered that as a user I'm unable to mount the system UEFI partition on my USB flash drive which is very weird because I need to work with it.
Can we please remove some of the following rules from 80-udisks2.rules, e.g. the ones which prevent the user from using valid MS-DOS partitions?