On Wed, 29 Dec 1999, Hamish Moffatt wrote:

> On Tue, Dec 28, 1999 at 04:39:06PM -0000, Dirk Koopman wrote:
> > Please would you answer the question? Why does it _actually_ need root
> > privileges for ax25 protocol traffic? We are talking here about something
> > which, whatever you do, is insecure. Anybody can program a TNC to be any
> > callsign. Anybody can monitor anything using a TNC. Why does linux have to be
> > different? 
> 
> Because Linux tries to integrate AX.25 with Unix, rather than Unix with AX.25.
> It treats AX.25 like just another protocol; it should be as secure as IP.
> Obviously it is trivially easy to imitate someone else's callsign if you
> really want to, even with linux.

But not without having root and/or hardware access to the system. Or
that's how it is supposed to be. IMHO in this case root access doesn't
have to mean a process running as root however.

-- 
--- Tomi Manninen / [EMAIL PROTECTED] / OH2BNS @ OH2RBI.FIN.EU ---

Reply via email to