From owner-freebsd-hackers Wed Jun 4 20:01:15 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id UAA01471 for hackers-outgoing; Wed, 4 Jun 1997 20:01:15 -0700 (PDT) Received: from ethanol.gnu.ai.mit.edu (joelh@ethanol.gnu.ai.mit.edu [128.52.46.64]) by hub.freebsd.org (8.8.5/8.8.5) with SMTP id UAA01466 for ; Wed, 4 Jun 1997 20:01:12 -0700 (PDT) Received: by ethanol.gnu.ai.mit.edu (8.6.12/8.6.12GNU) id XAA20255; Wed, 4 Jun 1997 23:00:52 -0400 Date: Wed, 4 Jun 1997 23:00:52 -0400 Message-Id: <199706050300.XAA20255@ethanol.gnu.ai.mit.edu> To: julian@whistle.com CC: freebsd-hackers@FreeBSD.ORG In-reply-to: <33959F79.237C228A@whistle.com> (message from Julian Elischer on Wed, 04 Jun 1997 10:01:45 -0700) Subject: Re: tty_snoop: why check uid? From: Joel Ray Holveck Reply-to: joelh@gnu.ai.mit.edu Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk >> Why does the snp device check to make sure that the user invoking it >> is root, instead of letting the admin set the permissions on the >> device to whatever he feels appropriate? >this would allow anyone who can 'talk' to you to 'snoop' >on you as well.. How's that? Happy hacking, joelh -- http://www.wp.com/piquan --- Joel Ray Holveck --- joelh@gnu.ai.mit.edu All my opinions are my own, not the Free Software Foundation's. Second law of programming: Anything that can go wrong wi sendmail: segmentation violation -- core dumped