On Samstag, 17. November 2018 17:37:39 CET Guido Trentalancia wrote:
> Bug #1329 has now been opened:
> 
> https://sigrok.org/bugzilla/show_bug.cgi?id=1329
> 
> Anyone can test the current udev rule that you wrote and easily realize
> that it triggers the bug, as explained in the bug report and in this
> thread.
> 
> It leads to *device opening failures*, therefore users are not able to
> use sigrok and libsigrok !

Nobody denies non-world read/writable device permissions leads to opening 
failures when opening is tried by someone not granted permission.

Denying access is the very point of access permissions.

The rules distributed by libsigroks covers a broad range of distributions and 
scenarios:

1. For distributions using logind (or one of its compatible replacements, e.g. 
elogind), access is granted for users having a local session.
2. For Debian based distributions, the plugdev rule is included, granting 
access based on group membership.

The plugdev rule can easily be adapted to local needs, using a different 
group, and placing it in /etc/udev/rules.d/.

Your patch removes any access control to the devices. This can be a 
significant security problem, as the rules also cover other devices connected 
using usb-serial converters, like braille devices.

Regards,

Stefan

-- 
Stefan Brüns  /  Bergstraße 21  /  52062 Aachen
home: +49 241 53809034     mobile: +49 151 50412019

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
sigrok-devel mailing list
sigrok-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sigrok-devel

Reply via email to