From owner-freebsd-hackers Wed Jun 4 10:04:21 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id KAA10699 for hackers-outgoing; Wed, 4 Jun 1997 10:04:21 -0700 (PDT) Received: from alpo.whistle.com (alpo.whistle.com [207.76.204.38]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id KAA10694 for ; Wed, 4 Jun 1997 10:04:18 -0700 (PDT) Received: (from daemon@localhost) by alpo.whistle.com (8.8.5/8.8.5) id KAA20466; Wed, 4 Jun 1997 10:02:42 -0700 (PDT) Received: from current1.whistle.com(207.76.205.22) via SMTP by alpo.whistle.com, id smtpd020460; Wed Jun 4 17:02:35 1997 Message-ID: <33959F79.237C228A@whistle.com> Date: Wed, 04 Jun 1997 10:01:45 -0700 From: Julian Elischer Organization: Whistle Communications X-Mailer: Mozilla 3.0Gold (X11; I; FreeBSD 2.2-CURRENT i386) MIME-Version: 1.0 To: joelh@gnu.ai.mit.edu CC: freebsd-hackers@FreeBSD.ORG Subject: Re: tty_snoop: why check uid? References: <199706040626.CAA13887@ethanol.gnu.ai.mit.edu> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Joel Ray Holveck wrote: > > Why does the snp device check to make sure that the user invoking it > is root, instead of letting the admin set the permissions on the > device to whatever he feels appropriate? > > Happy hacking, > joelh > > PS: Yes, I have a context diff to allow a kernel option to disable > this check availible on request. > > -- > http://www.wp.com/piquan --- Joel Ray Holveck --- joelh@gnu.ai.mit.edu > All my opinions are my own, not the Free Software Foundation's. > > Second law of programming: > Anything that can go wrong wi > sendmail: segmentation violation -- core dumped this would allow anyone who can 'talk' to you to 'snoop' on you as well.. it this your intention?