From owner-freebsd-hackers Fri Jun 6 12:52:46 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id MAA07784 for hackers-outgoing; Fri, 6 Jun 1997 12:52:46 -0700 (PDT) Received: from super-g.inch.com (super-g.com [204.178.32.161]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id MAA07778 for ; Fri, 6 Jun 1997 12:52:43 -0700 (PDT) Received: from localhost (spork@localhost) by super-g.inch.com (8.8.5/8.6.9) with SMTP id PAA23553; Fri, 6 Jun 1997 15:59:41 GMT Date: Fri, 6 Jun 1997 15:59:41 +0000 (GMT) From: spork X-Sender: spork@super-g.inch.com To: Joel Ray Holveck cc: freebsd-hackers@freebsd.org Subject: Re: tty_snoop: why check uid? In-Reply-To: <199706050254.WAA20216@ethanol.gnu.ai.mit.edu> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Check out the "sudo" program in ports... You can give certain people root privs on the programs (like snoop) you desire. Charles On Wed, 4 Jun 1997, Joel Ray Holveck wrote: > > >> Why does the snp device check to make sure that the user invoking it > >> is root, instead of letting the admin set the permissions on the > >> device to whatever he feels appropriate? > > Because if the tty snoop is not root, he/she soon will be. It is better > >not to fool yourself, and give the root password to all snoop users. > > I do. And I wanted to get around having to use 'su' for this operation. > > -- > http://www.wp.com/piquan --- Joel Ray Holveck --- joelh@gnu.ai.mit.edu > All my opinions are my own, not the Free Software Foundation's. > > Second law of programming: > Anything that can go wrong wi > sendmail: segmentation violation -- core dumped >