Description of problem: Serial devices like /dev/ttyS0, are not listed in /etc/security/console.perms. This means that users that log in can't do many things like use modems, gphoto with serial cameras, etc. because they don't have permissions to the device. If they had ownership when logged in, then they wouldn't have to chown/chmod the device to use it. Version-Release number of selected component (if applicable): This is true in RH9, FC1, FC2t2. I think it was true in 3.0.3 too. ;) How reproducible: Log in as a "regular" user. Run gphoto/gtkam/minicom or any other program that is trying to access a serial device. Actual results: You can't see the device so you get nothing. Expected results: Photos from the camera, a connection to your ISP, whatever... Additional info: I think you just need to add this to /etc/security/console.perms (untested): <serial>=/dev/ttyS[0-9]* <console> 0660 <serial> 0660 root.uucp
You don't want minicom run as the user anyways for dialout; it won't be able to start PPP, for example. /dev/camera is in console.perms, you just need a symlink.
The problem is that /I/ don't need a symlink, zillions of newbies do. I can set it easily enough. New users just see it as broken, which IMHO it is. If they have to open xterm to set symlinks, chmod/chown, you just lost at least half of them... I see the problem with PPP, but ttyS* could still be owned by the console owner, ya? This at least would get cameras going and any other serial devices that don't require rootly apps. Thanks. :)
This can't be done safely, not with the information we have at login-time, anyway. There could be users dialed *in* over serial lines, and changing permissions on their controlling terminals would be a severe mistake. Marking wontfix for that reason.