[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#185915: using capabilities, falling back to setuid



Hi,

I plan to fix this bug in the next Xastir upload.

I will do this by mirroring what wireshark have done, with a debconf
question as to whether or not non-root users should be able to use the
native AX.25 interface. If this option is selected it will:

  * create a xastir-ax25 group
  * chown /usr/bin/xastir to root:xastir-ax25
  * set NET_CAP_ADMIN and NET_CAP_RAW on /usr/bin/ax25
  * if setcap isn't available, fallback to making it setuid
  * the group is removed if xastir is uninstalled

This will only happen on Linux architectures, not on others like kFreeBSD,
as those architectures do not have libax25.

Access to serial TNCs, serial GPS, etc. will still require the user be added
to the dialout group as normal.

Thanks,
Iain.

-- 
e: irl@fsfe.org            w: iain.learmonth.me
x: irl@jabber.fsfe.org     t: EPVPN 2105
c: 2M0STB                  g: IO87we
p: 1F72 607C 5FF2 CCD5 3F01 600D 56FF 9EA4 E984 6C49

Attachment: pgpI2SO1t3CPr.pgp
Description: PGP signature


Reply to: