On Tue, Dec 28, 1999 at 04:39:06PM -0000, Dirk Koopman wrote:
> Please would you answer the question? Why does it _actually_ need root
> privileges for ax25 protocol traffic? We are talking here about something
> which, whatever you do, is insecure. Anybody can program a TNC to be any
> callsign. Anybody can monitor anything using a TNC. Why does linux have to be
> different? 

Because Linux tries to integrate AX.25 with Unix, rather than Unix with AX.25.
It treats AX.25 like just another protocol; it should be as secure as IP.
Obviously it is trivially easy to imitate someone else's callsign if you
really want to, even with linux.


Hamish
-- 
Hamish Moffatt       Mobile: +61 412 011 176     [EMAIL PROTECTED]
Rising Software Australia Pty. Ltd.    http://www.risingsoftware.com/
Phone: +61 3 9894 4788    Fax: +61 3 9894 3362    USA: 1 888 667 7839

Reply via email to