Date: 07 May 2001 04:03:13 +0200 From: Dag-Erling Smorgrav <des@ofug.org> To: Alfred Perlstein <alfred@FreeBSD.ORG> Cc: Dima Dorfman <dima@unixfreak.org>, "William E. Baxter" <web@superscript.com>, hackers@FreeBSD.ORG Subject: Re: Getting peer credentials on a unix domain socket Message-ID: <xzpae4pzzj2.fsf@flood.ping.uio.no> In-Reply-To: <20010504203457.V18676@fw.wintelcom.net> References: <20010504214702.A29392@zeus.superscript.com> <20010505032213.3FD923E0B@bazooka.unixfreak.org> <20010504203457.V18676@fw.wintelcom.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Alfred Perlstein <alfred@FreeBSD.ORG> writes: > The silly part of it is that the socket's initial credentials > might be different than the holder's credentials. That's a feature, just like you can open /dev/io as root, then drop root privs and do direct I/O to your heart's content even if you're no longer root. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpae4pzzj2.fsf>