Re: Best Practice for Allowing non-root Users Access to Serial Port?

2005-04-01 Thread Chris
Martin McCormick wrote: What is the safest way to let non-root users access /dev/ttyd0? I notice that in FreeBSD, /dev/ttydx is owned by root:wheel. In linux, the ttySx's are in a special group so the trick there is to add users to that group and make sure the ttyS's are group writable.

Re: Best Practice for Allowing non-root Users Access to Serial Port?

2005-04-01 Thread Roland Smith
On Fri, Apr 01, 2005 at 11:17:14AM -0600, Martin McCormick wrote: What is the safest way to let non-root users access /dev/ttyd0? I notice that in FreeBSD, /dev/ttydx is owned by root:wheel. In linux, the ttySx's are in a special group so the trick there is to add users to that group

Re: Best Practice for Allowing non-root Users Access to Serial Port?

2005-04-01 Thread David Kelly
On Fri, Apr 01, 2005 at 11:17:14AM -0600, Martin McCormick wrote: What is the safest way to let non-root users access /dev/ttyd0? I notice that in FreeBSD, /dev/ttydx is owned by root:wheel. In linux, the ttySx's are in a special group so the trick there is to add users to that group

Re: Best Practice for Allowing non-root Users Access to Serial Port?

2005-04-01 Thread Martin McCormick
My thanks to all who have responded with this and similar recommendations: Roland Smith writes: Making kermit users members of a group, and have that group own /dev/cuaa* with read/write privileges seems like a good idea. For instance, create a group kermit with 'pw groupadd kermit'.

Re: Best Practice for Allowing non-root Users Access to Serial Port?

2005-04-01 Thread Martin McCormick
Roland Smith writes: Since you want to dial out, I think you'll need to use /dev/cuaa*. This turns out to be a much better choice than /dev/ttyd0. I forgot about those serial devices completely because I was focused on the ttyd* devices. The cuaa devices at least in FreeBSD4.11 are