Martin McCormick wrote:
What is the safest way to let non-root users access
/dev/ttyd0? I notice that in FreeBSD, /dev/ttydx is owned by
root:wheel. In linux, the ttySx's are in a special group so the trick
there is to add users to that group and make sure the ttyS's are group
writable.
On Fri, Apr 01, 2005 at 11:17:14AM -0600, Martin McCormick wrote:
What is the safest way to let non-root users access
/dev/ttyd0? I notice that in FreeBSD, /dev/ttydx is owned by
root:wheel. In linux, the ttySx's are in a special group so the trick
there is to add users to that group
On Fri, Apr 01, 2005 at 11:17:14AM -0600, Martin McCormick wrote:
What is the safest way to let non-root users access
/dev/ttyd0? I notice that in FreeBSD, /dev/ttydx is owned by
root:wheel. In linux, the ttySx's are in a special group so the trick
there is to add users to that group
My thanks to all who have responded with this and similar
recommendations:
Roland Smith writes:
Making kermit users members of a group, and have that group own
/dev/cuaa* with read/write privileges seems like a good idea.
For instance, create a group kermit with 'pw groupadd kermit'.
Roland Smith writes:
Since you want to dial out, I think you'll need to use /dev/cuaa*.
This turns out to be a much better choice than /dev/ttyd0. I
forgot about those serial devices completely because I was focused on
the ttyd* devices. The cuaa devices at least in FreeBSD4.11 are