Description of problem: When plugging in a USB-Serial dongle, /dev/ttyUSBx is created as: root:uucp instead of $USER:uucp Version-Release number of selected component (if applicable): Any. How reproducible: Always Steps to Reproduce: 1. Plug in USB-Serial dongle. 2. 3. Actual results: Ownership of /dev/ttyUSBx is root:uucp Expected results: Ownership should be that of the logged-in user. Additional info: The following rules added to /etc/security/console.perms.d/ fix this: <usb>=/dev/ttyUSB* <console> 0660 <usb> 0660 root.usb
I like that something need to be done by root to set access for users to non-standard USB device. However, something needs to be done to allow easy access for users that need it and block those that don't (like a group access set by root).
pam_console is deprecated. This has to be handled by HAL+consolekit.
I'n not fussed how this is achieved in the long run; the pam_console stuff *works* right now, so thats how I'm solving my immediate problem. I'm not sure I'd class a USB<->Serial converter as "non-standard" - I shouldn't need to fiddle as root to use one to configure Network devices (Cisco et al) or even potentially connect such things as a serial digitising tablet.
Have you tried with the latest hal package in Fedora 10, Fedora 11 or tried Rawhide? In either case, can you let us know whether the issue is still happening, and give the current version of the HAL packages you're using? -- Fedora Bugzappers volunteer triage team https://fedoraproject.org/wiki/BugZappers
Latest Fedora 10 seems to have fixed this. Plugging in a usb-serial converter and running minicom as non-root works as expected.
Based on the information provided in comment 5 I am marking this bug as closed. Should you again experienced these issues in the future please file a new bug against the actual component. Thanks for the rapid response. -- Fedora Bugzappers volunteer triage team https://fedoraproject.org/wiki/BugZappers