On Wed, 29 Dec 1999, Hamish Moffatt wrote:
> On Tue, Dec 28, 1999 at 04:39:06PM -0000, Dirk Koopman wrote:
> > Please would you answer the question? Why does it _actually_ need root
> > privileges for ax25 protocol traffic? We are talking here about something
> > which, whatever you do, is insecure. Anybody can program a TNC to be any
> > callsign. Anybody can monitor anything using a TNC. Why does linux have to be
> > different?
>
> Because Linux tries to integrate AX.25 with Unix, rather than Unix with AX.25.
> It treats AX.25 like just another protocol; it should be as secure as IP.
> Obviously it is trivially easy to imitate someone else's callsign if you
> really want to, even with linux.
But not without having root and/or hardware access to the system. Or
that's how it is supposed to be. IMHO in this case root access doesn't
have to mean a process running as root however.
--
--- Tomi Manninen / [EMAIL PROTECTED] / OH2BNS @ OH2RBI.FIN.EU ---