Skip site navigation (1)Skip section navigation (2)
Date:      07 May 2001 04:03:13 +0200
From:      Dag-Erling Smorgrav <des@ofug.org>
To:        Alfred Perlstein <alfred@FreeBSD.ORG>
Cc:        Dima Dorfman <dima@unixfreak.org>, "William E. Baxter" <web@superscript.com>, hackers@FreeBSD.ORG
Subject:   Re: Getting peer credentials on a unix domain socket
Message-ID:  <xzpae4pzzj2.fsf@flood.ping.uio.no>
In-Reply-To: <20010504203457.V18676@fw.wintelcom.net>
References:  <20010504214702.A29392@zeus.superscript.com> <20010505032213.3FD923E0B@bazooka.unixfreak.org> <20010504203457.V18676@fw.wintelcom.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Alfred Perlstein <alfred@FreeBSD.ORG> writes:
> The silly part of it is that the socket's initial credentials
> might be different than the holder's credentials.

That's a feature, just like you can open /dev/io as root, then drop
root privs and do direct I/O to your heart's content even if you're no
longer root.

DES
-- 
Dag-Erling Smorgrav - des@ofug.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpae4pzzj2.fsf>