BSD tty security, part 4: What You Can Look Forward To

John F Haugh II jfh at greenber.austin.ibm.com
Sat May 4 07:28:54 AEST 1991


In article <18954 at sdcc6.ucsd.edu> muller at sdcc10.ucsd.edu (Keith Muller) writes:
>In article <1991May2.202847.15537 at wpi.WPI.EDU>, entropy at wpi.WPI.EDU (Lawrence C Foard) writes:
>I would tend to want an open of /dev/tty to always check the current
>access to the controlling terminal.

The current implementations of /dev/tty don't cause the open to go
through the filesystem.  Nor would that always be possible - the
"current access" can be completely meaningless if there are more than
one (or even none) instances of that device.

One of the advantages of "POSIX-like" tty subsystems is that /dev/tty
operations can be restricted by "session id".  Dan can tell you what
is wrong with how POSIX works with regard to this feature ...
-- 
John F. Haugh II      |      I've Been Moved     |    MaBellNet: (512) 838-4340
SneakerNet: 809/1D064 |          AGAIN !         |      VNET: LCCB386 at AUSVMQ
BangNet: ..!cs.utexas.edu!ibmchs!auschs!snowball.austin.ibm.com!jfh (e-i-e-i-o)



More information about the Comp.unix.wizards mailing list