Date: Wed, 13 Apr 2005 17:04:10 +0100 (BST) From: Robert Watson <rwatson@FreeBSD.org> To: "Matthew N. Dodd" <mdodd@FreeBSD.org> Cc: cvs-all@FreeBSD.org Subject: Re: cvs commit: src/share/man/man4 tap.4 src/sys/net if_tap.c Message-ID: <20050413170217.P95037@fledge.watson.org> In-Reply-To: <200504130030.j3D0UJDN082846@repoman.freebsd.org> References: <200504130030.j3D0UJDN082846@repoman.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 13 Apr 2005, Matthew N. Dodd wrote: > mdodd 2005-04-13 00:30:19 UTC > > FreeBSD src repository > > Modified files: > share/man/man4 tap.4 > sys/net if_tap.c > Log: > Provide a sysctl (net.link.tap.user_open) to allow unpriviliged > acces to tap(4) device nodes based on file system permission. > > Duplicate the 'debug.if_tap_debug' sysctl under the > 'net.link.tap' hierarchy. Is there any reason to require suser() at all for open, given that our devfs permissions are conservative? Maybe we should remove that suser() and add a couple for specific tapioctl() calls that are more sensitive? Robert N M Watson
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050413170217.P95037>