Date: Wed, 26 Nov 2003 10:16:09 -0500 From: Mike Tancsa <mike@sentex.net> To: freebsd-security@freebsd.org Subject: perms of /dev/uhid0 Message-ID: <6.0.1.1.0.20031126101602.06e8e9f0@209.112.4.2>
next in thread | raw e-mail | index | archive | help
I wrote a small app that monitors a Back-UPS ES500 UPS via the uhid0 interface. I want to run the daemon with as little privs as possible. gastest# ls -l /dev/uhid0 crw-rw---- 1 root operator 122, 0 Nov 12 05:26 /dev/uhid0 gastest# Is it safe to chmod o+r /dev/uhid0 ? Or is there a better way to drop privs of the daemon yet still be able to read from the device ? All I am doing is char *devname = "/dev/uhid0"; fd = open( devname, O_RDONLY ); if( fd < 0 ) { perror( "open" ); return -1; } do { count = read( fd, buff, sizeof( buff ) ); .... rest of the program -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.1.1.0.20031126101602.06e8e9f0>