Serial port devices (ttyS*) unaccessible from non-root accounts
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
uucp (Ubuntu) |
Invalid
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: udev
Currently, serial port devices (/dev/ttyS[0-3]) have 660 permissions and root.dialout ownership. This however is not enough for some serial communication applications to access the devices from a non-root account even if they are in the dialout group. Kermit, and reportedly cu and minicom are affected. Setting the permissions to 666 resolves the issue. I've attached my patch to the rules for setting 666 permissions but someone with expertise in this area needs to review the permissions, group assignment, and behavior of the applications to determine if this is the best solution. Other reports of the problem and various solutions:
http://
http://
Changed in udev: | |
status: | Invalid → New |
Place your user account, or that of the running daemon, in the dialout group