Re: Agrsm problem - dialout safety

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Roy,

When
$ sudo modprobe agrmodem
$ sudo modprobe agrserial
there is dynamically created the port
$  ls -l /dev/ttyAGS3
crw-rw---- 1 root dialout 62, 67 2008-02-11 22:31 /dev/ttyAGS3

which is not read-writeable as is by an ordinary user.
 $ sudo chmod a+rw  /dev/ttyAGS3
does the desired change
$ ls -l /dev/ttyAGS3
crw-rw-rw- 1 root dialout 62, 67 2008-02-11 22:31 /dev/ttyAGS3
is now read-write to all.

This can only be achieved automatically, by including the
    chmod a+rw  /dev/ttyAGS3
in some bootup script.  I'll work one out for you by the weekend.
Am very busy with all day meetings and travel till then.

MarvS



On Feb 11, 2008 5:59 PM, Roy Taylor <crt@xxxxxxxxxx> wrote:
> Sorry, folks, I'm behind in my list reading.  MarvS answered this one, I
> think, in a 2/9/08 post.
>
> -- Roy
>
> Roy Taylor wrote:
> > OK, I understand healthy paranoia, but how can I safely allow a non-root
> > user to dial out?
>

[Index of Archives]     [Linux Media Development]     [Asterisk]     [DCCP]     [Netdev]     [X.org]     [Xfree86]     [Fedora Women]     [Linux USB]

  Powered by Linux