BSD tty security, part 4: What You Can Look Forward To
John F Haugh II
jfh at greenber.austin.ibm.com
Sat May 4 07:28:54 AEST 1991
In article <18954 at sdcc6.ucsd.edu> muller at sdcc10.ucsd.edu (Keith Muller) writes:
>In article <1991May2.202847.15537 at wpi.WPI.EDU>, entropy at wpi.WPI.EDU (Lawrence C Foard) writes:
>I would tend to want an open of /dev/tty to always check the current
>access to the controlling terminal.
The current implementations of /dev/tty don't cause the open to go
through the filesystem. Nor would that always be possible - the
"current access" can be completely meaningless if there are more than
one (or even none) instances of that device.
One of the advantages of "POSIX-like" tty subsystems is that /dev/tty
operations can be restricted by "session id". Dan can tell you what
is wrong with how POSIX works with regard to this feature ...
--
John F. Haugh II | I've Been Moved | MaBellNet: (512) 838-4340
SneakerNet: 809/1D064 | AGAIN ! | VNET: LCCB386 at AUSVMQ
BangNet: ..!cs.utexas.edu!ibmchs!auschs!snowball.austin.ibm.com!jfh (e-i-e-i-o)
More information about the Comp.unix.wizards
mailing list