Skip to content

tcpdump should open file, where captured packets are going to be writ… #749

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

Sashan
Copy link

@Sashan Sashan commented Apr 17, 2019

…ten to,

before it switches to user nobody.

patch has been submitted to upstream:
#637

…ten to,

before it switches to user nobody.

patch has been submitted to upstream:
the-tcpdump-group#637
@mcr
Copy link
Member

mcr commented Apr 30, 2019

The problem with this is that tcpdump opens files again with -C switches, and so really mechanisms were tcpdump has any privilege are broken. Your patch is welcome, but we need to decide how to do privilege separation correctly: tcpdump has perhaps three or four levels of trust.

@Sashan
Copy link
Author

Sashan commented Apr 30, 2019

The problem with this is that tcpdump opens files again with -C switches, and so really mechanisms were tcpdump has any privilege are broken. Your patch is welcome, but we need to decide how to do privilege separation correctly: tcpdump has perhaps three or four levels of trust.

I see. To be honest I have not looked at that deeply enough. I've just crafted the patch, which addresses the most common scenario for Solaris, which is mentioned in #637. I'll try to re-work my patch.

@fxlb fxlb marked this pull request as draft January 17, 2025 14:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

3 participants