Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Nov 2003 10:28:31 -0500 (EST)
From:      Matt Piechota <piechota@argolis.org>
To:        Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: perms of /dev/uhid0 
Message-ID:  <20031126102631.L16087@cithaeron.argolis.org>
In-Reply-To: <6.0.1.1.0.20031126101602.06e8e9f0@209.112.4.2>
References:  <6.0.1.1.0.20031126101602.06e8e9f0@209.112.4.2>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 26 Nov 2003, Mike Tancsa wrote:

> gastest# ls -l /dev/uhid0
> crw-rw----  1 root  operator  122,   0 Nov 12 05:26 /dev/uhid0
> gastest#
>
> Is it safe to chmod o+r /dev/uhid0 ?  Or is there a better way to drop
> privs of the daemon yet still be able to read from the device ?

Maybe I'm a bit off, but: wouldn't it be okay to 'chgrp upsmon /dev/uhid0'
in usbd.conf, and make a upsmon user and group to run the daemon under?

-- 
Matt Piechota



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20031126102631.L16087>