From owner-freebsd-questions@FreeBSD.ORG Fri Apr 1 17:21:08 2005 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5449716A4CE for ; Fri, 1 Apr 2005 17:21:08 +0000 (GMT) Received: from makeworld.com (makeworld.com [216.201.118.142]) by mx1.FreeBSD.org (Postfix) with ESMTP id DC20043D2F for ; Fri, 1 Apr 2005 17:21:07 +0000 (GMT) (envelope-from racerx@makeworld.com) Received: from localhost (localhost.com [127.0.0.1]) by makeworld.com (Postfix) with ESMTP id 283E560DB; Fri, 1 Apr 2005 11:21:07 -0600 (CST) Received: from makeworld.com ([127.0.0.1]) by localhost (makeworld.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 52309-03; Fri, 1 Apr 2005 11:21:05 -0600 (CST) Received: from [127.0.0.1] (unknown [63.117.97.191]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by makeworld.com (Postfix) with ESMTP id BE22760D6; Fri, 1 Apr 2005 11:21:01 -0600 (CST) Message-ID: <424D82FA.3030405@makeworld.com> Date: Fri, 01 Apr 2005 11:20:58 -0600 From: Chris User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Martin McCormick References: <200504011717.j31HHE9S080897@dc.cis.okstate.edu> In-Reply-To: <200504011717.j31HHE9S080897@dc.cis.okstate.edu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: by ClamAV 0.75.1/amavisd-new-2.2.1 (20041222) at makeworld.com - Isn't it ironic cc: freebsd-questions@freebsd.org Subject: Re: Best Practice for Allowing non-root Users Access to Serial Port? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Apr 2005 17:21:08 -0000 Martin McCormick wrote: > What is the safest way to let non-root users access >/dev/ttyd0? I notice that in FreeBSD, /dev/ttydx is owned by >root:wheel. In linux, the ttySx's are in a special group so the trick >there is to add users to that group and make sure the ttyS's are group >writable. > > Here, I want the users to be able to use C-kermit to talk to a >remote device without them having to be root. > > One way (don't know how safe) is to allow access via sudo - have a look at the sudo conf file in /usr/local/etc/sudoers -- Best regards, Chris PGP Fingerprint = D976 2575 D0B4 E4B0 45CC AA09 0F93 FF80 C01B C363