summaryrefslogtreecommitdiff
path: root/vtysh/vtysh.c
diff options
context:
space:
mode:
authorpaul <paul>2003-05-21 19:09:31 +0000
committerpaul <paul>2003-05-21 19:09:31 +0000
commit3dec2de3eecd475db69ec3746a631ec1591d08a5 (patch)
tree89fdeae9d2c70d989b5322bd8a8af2dff2b0bae8 /vtysh/vtysh.c
parenta304c1a4121c27ef807ffbea979f1460d4c5e0ee (diff)
From: Paul Jakma <paulj@alphyra.ie>
Subject: [zebra 19125] vtysh bogus perms check vtysh checks that the zebra.vty socket uid is == to its own euid, this is bogus - let the kernel decide whether permissions match, vtysh shouldnt try second guess. (this becomes noticeable when neither zebra nor vtysh are run as root :) )
Diffstat (limited to 'vtysh/vtysh.c')
-rw-r--r--vtysh/vtysh.c8
1 files changed, 0 insertions, 8 deletions
diff --git a/vtysh/vtysh.c b/vtysh/vtysh.c
index d1a5c5fd..be1f03e4 100644
--- a/vtysh/vtysh.c
+++ b/vtysh/vtysh.c
@@ -1618,14 +1618,6 @@ vtysh_connect (struct vtysh_client *vclient, char *path)
exit (1);
}
- if (euid != s_stat.st_uid
- || !(s_stat.st_mode & S_IWUSR)
- || !(s_stat.st_mode & S_IRUSR))
- {
- fprintf (stderr, "vtysh_connect(%s): No permission to access socket\n",
- path);
- exit (1);
- }
}
sock = socket (AF_UNIX, SOCK_STREAM, 0);