Allow a regular user to mount VeraCrypt volume without admin privileges

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP








up vote
2
down vote

favorite












A regular user is unable to mount a VeraCrypt volume without first authenticating with an administrator password. According to the original TrueCrypt documentation, the workaround is to give the user sudo privileges on the veracrypt directory.




Edit visudo and add USERNAME ALL = (root) NOPASSWD:/usr/bin/veracrypt




Source = Method 2 here



This is insecure and opens up doors for vulnerabilities at the root level.



Source: Is it secure to mount VeraCrypt without sudo password in this way | Security SE



How can a regular user safely mount a VeraCrypt container without needing the administrator password or having sudo privileges?



Or is it actually safe to add the above to visudo?







share|improve this question






















  • I don’t believe it’s possible to safely allow non-root users to mount veracrypt containers without changing the way that veracrypt mounts filesystems.
    – Steve
    May 17 at 4:27










  • I have not been able to find a solution. Files are secure in the Veracrypt container, but using the recommended procedure to allow users to mount the volume makes the entire device vulnerable. Seems to defeat the purpose. I'm determined to find a way to do this safely.
    – slatica
    Jul 29 at 15:29














up vote
2
down vote

favorite












A regular user is unable to mount a VeraCrypt volume without first authenticating with an administrator password. According to the original TrueCrypt documentation, the workaround is to give the user sudo privileges on the veracrypt directory.




Edit visudo and add USERNAME ALL = (root) NOPASSWD:/usr/bin/veracrypt




Source = Method 2 here



This is insecure and opens up doors for vulnerabilities at the root level.



Source: Is it secure to mount VeraCrypt without sudo password in this way | Security SE



How can a regular user safely mount a VeraCrypt container without needing the administrator password or having sudo privileges?



Or is it actually safe to add the above to visudo?







share|improve this question






















  • I don’t believe it’s possible to safely allow non-root users to mount veracrypt containers without changing the way that veracrypt mounts filesystems.
    – Steve
    May 17 at 4:27










  • I have not been able to find a solution. Files are secure in the Veracrypt container, but using the recommended procedure to allow users to mount the volume makes the entire device vulnerable. Seems to defeat the purpose. I'm determined to find a way to do this safely.
    – slatica
    Jul 29 at 15:29












up vote
2
down vote

favorite









up vote
2
down vote

favorite











A regular user is unable to mount a VeraCrypt volume without first authenticating with an administrator password. According to the original TrueCrypt documentation, the workaround is to give the user sudo privileges on the veracrypt directory.




Edit visudo and add USERNAME ALL = (root) NOPASSWD:/usr/bin/veracrypt




Source = Method 2 here



This is insecure and opens up doors for vulnerabilities at the root level.



Source: Is it secure to mount VeraCrypt without sudo password in this way | Security SE



How can a regular user safely mount a VeraCrypt container without needing the administrator password or having sudo privileges?



Or is it actually safe to add the above to visudo?







share|improve this question














A regular user is unable to mount a VeraCrypt volume without first authenticating with an administrator password. According to the original TrueCrypt documentation, the workaround is to give the user sudo privileges on the veracrypt directory.




Edit visudo and add USERNAME ALL = (root) NOPASSWD:/usr/bin/veracrypt




Source = Method 2 here



This is insecure and opens up doors for vulnerabilities at the root level.



Source: Is it secure to mount VeraCrypt without sudo password in this way | Security SE



How can a regular user safely mount a VeraCrypt container without needing the administrator password or having sudo privileges?



Or is it actually safe to add the above to visudo?









share|improve this question













share|improve this question




share|improve this question








edited May 16 at 19:56









Zanna

47.9k13117227




47.9k13117227










asked May 16 at 18:03









slatica

133




133











  • I don’t believe it’s possible to safely allow non-root users to mount veracrypt containers without changing the way that veracrypt mounts filesystems.
    – Steve
    May 17 at 4:27










  • I have not been able to find a solution. Files are secure in the Veracrypt container, but using the recommended procedure to allow users to mount the volume makes the entire device vulnerable. Seems to defeat the purpose. I'm determined to find a way to do this safely.
    – slatica
    Jul 29 at 15:29
















  • I don’t believe it’s possible to safely allow non-root users to mount veracrypt containers without changing the way that veracrypt mounts filesystems.
    – Steve
    May 17 at 4:27










  • I have not been able to find a solution. Files are secure in the Veracrypt container, but using the recommended procedure to allow users to mount the volume makes the entire device vulnerable. Seems to defeat the purpose. I'm determined to find a way to do this safely.
    – slatica
    Jul 29 at 15:29















I don’t believe it’s possible to safely allow non-root users to mount veracrypt containers without changing the way that veracrypt mounts filesystems.
– Steve
May 17 at 4:27




I don’t believe it’s possible to safely allow non-root users to mount veracrypt containers without changing the way that veracrypt mounts filesystems.
– Steve
May 17 at 4:27












I have not been able to find a solution. Files are secure in the Veracrypt container, but using the recommended procedure to allow users to mount the volume makes the entire device vulnerable. Seems to defeat the purpose. I'm determined to find a way to do this safely.
– slatica
Jul 29 at 15:29




I have not been able to find a solution. Files are secure in the Veracrypt container, but using the recommended procedure to allow users to mount the volume makes the entire device vulnerable. Seems to defeat the purpose. I'm determined to find a way to do this safely.
– slatica
Jul 29 at 15:29















active

oldest

votes











Your Answer







StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "89"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: false,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);








 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1037073%2fallow-a-regular-user-to-mount-veracrypt-volume-without-admin-privileges%23new-answer', 'question_page');

);

Post as a guest



































active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes










 

draft saved


draft discarded


























 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1037073%2fallow-a-regular-user-to-mount-veracrypt-volume-without-admin-privileges%23new-answer', 'question_page');

);

Post as a guest













































































Popular posts from this blog

pylint3 and pip3 broken

Missing snmpget and snmpwalk

How to enroll fingerprints to Ubuntu 17.10 with VFS491