From mboxrd@z Thu Jan 1 00:00:00 1970 From: erik quanstrom Date: Thu, 29 Jan 2015 06:52:19 -0800 To: 9fans@9fans.net Message-ID: In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Subject: Re: [9fans] A few questions about 9p Topicbox-Message-UUID: 3e129178-ead9-11e9-9d60-3106f5b1d025 > >> I can't find details on the file execution permission: looks like a > malicious client could just ignore it on files and execute anything that it > can read (obviously I'm just talking about single files, not directory). > > > > It's not malicious, just incorrect. Obviously you can't execute a > remote image or script unless you read it. > > By malicious I mean that the client could execute a script that it wasn't > allowed to. if you can read the executable you can already copy it somewhere, set the execute bit, and away you go. the x bit is purely advisory. it is not a security mechanism. - erik