From owner-freebsd-hackers Wed Jun 4 15:53:24 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id PAA25208 for hackers-outgoing; Wed, 4 Jun 1997 15:53:24 -0700 (PDT) Received: from misery.sdf.com (misery.sdf.com [204.244.210.193]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id PAA25125 for ; Wed, 4 Jun 1997 15:53:18 -0700 (PDT) Received: from localhost (tom@localhost) by misery.sdf.com (8.8.5/8.8.5) with SMTP id PAA08160; Wed, 4 Jun 1997 15:52:25 -0700 (PDT) X-Authentication-Warning: misery.sdf.com: tom owned process doing -bs Date: Wed, 4 Jun 1997 15:52:23 -0700 (PDT) From: Tom Samplonius To: Joel Ray Holveck cc: freebsd-hackers@FreeBSD.ORG Subject: Re: tty_snoop: why check uid? In-Reply-To: <199706040626.CAA13887@ethanol.gnu.ai.mit.edu> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Wed, 4 Jun 1997, Joel Ray Holveck wrote: > Why does the snp device check to make sure that the user invoking it > is root, instead of letting the admin set the permissions on the > device to whatever he feels appropriate? > > Happy hacking, > joelh > > PS: Yes, I have a context diff to allow a kernel option to disable > this check availible on request. > > -- > http://www.wp.com/piquan --- Joel Ray Holveck --- joelh@gnu.ai.mit.edu > All my opinions are my own, not the Free Software Foundation's. > > Second law of programming: > Anything that can go wrong wi > sendmail: segmentation violation -- core dumped > > > Because if the tty snoop is not root, he/she soon will be. It is better not to fool yourself, and give the root password to all snoop users. Tom