Crist J. Clark wrote: > These are actually very different in that they are set{u,g}id commands > (well, ps(1) is not set{u,g}id anymore and is root:wheel owned). The > sniffing tools we've been discussing, and pretty much all of the ones > I've used, tcpdump(1), snort(8), nmap(1), etc., are not. When > tcpdump(1) or one of these ports is installed, there is no reason to > give it any special group ownership. The thing that determines whether > someone can sniff is the {u,g}id of the user executing the > command. The port's Makefile doesn't need to know anything about your > /etc/group; it just installs the file -r-xr-x-r-x root:wheel. The > local administrator simply needs to execute the simple commands I put > in my last mail to give a group sniffing powers. The files' > permissions and ownership are never changed.
Since -current by default uses devfs, is there a standard way to make the ownership/permissions of device nodes "sticky" so that they persist across boots? Or should we just put the appropriate commands in rc.local ? Besides bpf, this would be useful, for example, for people who want to change permissions on cd-rom devices to 644 so that non-root users can make iso images (or give a special group cd burner rights). Craig To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message