Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Apr 2005 17:04:10 +0100 (BST)
From:      Robert Watson <rwatson@FreeBSD.org>
To:        "Matthew N. Dodd" <mdodd@FreeBSD.org>
Cc:        cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/share/man/man4 tap.4 src/sys/net if_tap.c
Message-ID:  <20050413170217.P95037@fledge.watson.org>
In-Reply-To: <200504130030.j3D0UJDN082846@repoman.freebsd.org>
References:  <200504130030.j3D0UJDN082846@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, 13 Apr 2005, Matthew N. Dodd wrote:

> mdodd       2005-04-13 00:30:19 UTC
>
>  FreeBSD src repository
>
>  Modified files:
>    share/man/man4       tap.4
>    sys/net              if_tap.c
>  Log:
>  Provide a sysctl (net.link.tap.user_open) to allow unpriviliged
>  acces to tap(4) device nodes based on file system permission.
>
>  Duplicate the 'debug.if_tap_debug' sysctl under the
>  'net.link.tap' hierarchy.

Is there any reason to require suser() at all for open, given that our 
devfs permissions are conservative?  Maybe we should remove that suser() 
and add a couple for specific tapioctl() calls that are more sensitive?

Robert N M Watson



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050413170217.P95037>