Home
last modified time | relevance | path

Searched hist:"3 d5013337a7136f8ee099cb27f0c66160dd27c91" (Results 1 – 2 of 2) sorted by relevance

/freebsd/sys/net/
H A Dif_tuntap.cdiff 3d5013337a7136f8ee099cb27f0c66160dd27c91 Mon Oct 21 16:38:11 CEST 2019 Kyle Evans <kevans@FreeBSD.org> tuntap(4): restrict scope of net.link.tap.user_open slightly

net.link.tap.user_open has historically allowed non-root users to do devfs
cloning and open /dev/tap* nodes based on permissions. Loosen this up to
make it only allow users to do devfs cloning -- we no longer check it in
tunopen.

This allows tap devices to be created that can actually be opened by a user,
rather than swiftly restricting them to root because the magic sysctl has
not been set.

The sysctl has not yet been completely deprecated, because more thought is
needed for how to handle the devfs cloning case. There is not an easy
suitable replacement for the sysctl there, and more care needs to be placed
in determining whether that's OK or not.

PR: 200185
/freebsd/
H A DUPDATINGdiff 3d5013337a7136f8ee099cb27f0c66160dd27c91 Mon Oct 21 16:38:11 CEST 2019 Kyle Evans <kevans@FreeBSD.org> tuntap(4): restrict scope of net.link.tap.user_open slightly

net.link.tap.user_open has historically allowed non-root users to do devfs
cloning and open /dev/tap* nodes based on permissions. Loosen this up to
make it only allow users to do devfs cloning -- we no longer check it in
tunopen.

This allows tap devices to be created that can actually be opened by a user,
rather than swiftly restricting them to root because the magic sysctl has
not been set.

The sysctl has not yet been completely deprecated, because more thought is
needed for how to handle the devfs cloning case. There is not an easy
suitable replacement for the sysctl there, and more care needs to be placed
in determining whether that's OK or not.

PR: 200185