From owner-freebsd-hackers Tue Jun 3 23:26:46 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id XAA28543 for hackers-outgoing; Tue, 3 Jun 1997 23:26:46 -0700 (PDT) Received: from ethanol.gnu.ai.mit.edu (joelh@ethanol.gnu.ai.mit.edu [128.52.46.64]) by hub.freebsd.org (8.8.5/8.8.5) with SMTP id XAA28537 for ; Tue, 3 Jun 1997 23:26:43 -0700 (PDT) Received: by ethanol.gnu.ai.mit.edu (8.6.12/8.6.12GNU) id CAA13887; Wed, 4 Jun 1997 02:26:33 -0400 Message-Id: <199706040626.CAA13887@ethanol.gnu.ai.mit.edu> From: Joel Ray Holveck Date: Wed, 4 Jun 1997 02:24:02 -0400 To: freebsd-hackers@freebsd.org Subject: tty_snoop: why check uid? Reply-to: joelh@gnu.ai.mit.edu Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Why does the snp device check to make sure that the user invoking it is root, instead of letting the admin set the permissions on the device to whatever he feels appropriate? Happy hacking, joelh PS: Yes, I have a context diff to allow a kernel option to disable this check availible on request. -- http://www.wp.com/piquan --- Joel Ray Holveck --- joelh@gnu.ai.mit.edu All my opinions are my own, not the Free Software Foundation's. Second law of programming: Anything that can go wrong wi sendmail: segmentation violation -- core dumped