Tails mounts a windows boot partition with amnesia rights
a user complains that Tails is mounting the Boot partition of Windows, without asking for an administrator password.
the logs are showing this :
amnesia udisksd15824: Mounted /dev/sde2 at /media/amnesia/BootDisk-Windows10 on behalf of uid 1000
- WhisperBack report: cfa91021a201076cbc684396d7d6d190
#2 Updated by intrigeri over 1 year ago
- Assignee changed from intrigeri to goupille
- QA Check set to Info Needed
I suspect the internal drive is somehow recognized as a removable one and/or the partition has a GPT flag that says "please mount me!" to the OS, or something. I can't easily investigate this without more info as I have no such Windows disk around.
Any chance we can get info from this person? The output of "udisksctl dump" would be useful. It's sensitive info so better send it to me privately.
#5 Updated by intrigeri over 1 year ago
The offending device is a 250GB drive connected via USB. And indeed, in the
live-persist log I see
[sde] Attached SCSI removable disk.
This explains why the user has write access to this storage device (probably because of
So either this drive is physically internal, i.e. inside the computer, and then this is another instance of our well-known semantics problem wrt. internal vs. external drives.
Or it's an external USB drive, and then I think Tails works as designed and intended, and if the user doesn't want their Tails to have access to such a drive, then they should unplug it.
Let's see once goupille has given me the requested info.