From owner-freebsd-hackers Wed Jun 30 11:26:23 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from wall.polstra.com (rtrwan160.accessone.com [206.213.115.74]) by hub.freebsd.org (Postfix) with ESMTP id 010AB15635 for ; Wed, 30 Jun 1999 11:26:19 -0700 (PDT) (envelope-from jdp@polstra.com) Received: from vashon.polstra.com (vashon.polstra.com [206.213.73.13]) by wall.polstra.com (8.9.3/8.9.1) with ESMTP id LAA05119; Wed, 30 Jun 1999 11:26:17 -0700 (PDT) (envelope-from jdp@polstra.com) From: John Polstra Received: (from jdp@localhost) by vashon.polstra.com (8.9.3/8.9.1) id LAA07099; Wed, 30 Jun 1999 11:26:17 -0700 (PDT) (envelope-from jdp@polstra.com) Date: Wed, 30 Jun 1999 11:26:17 -0700 (PDT) Message-Id: <199906301826.LAA07099@vashon.polstra.com> To: mph@astro.caltech.edu Subject: Re: tcpdump(1) additions. In-Reply-To: <19990630092358.A51584@wopr.caltech.edu> References: <19990630011532.A97926@dragon.nuxi.com> Organization: Polstra & Co., Seattle, WA Cc: hackers@freebsd.org Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In article <19990630092358.A51584@wopr.caltech.edu>, Matthew Hunt wrote: > > I think the point is that when root is running tcpdump on host A, a bad > guy on host B can create a packet which makes tcpdump on A execute his > code (as root, since that's who's running it). This is not desirable. I would say it is not _acceptable_. The code shouldn't go into our source tree until the known buffer overflow problems have been fixed. It's just stupid to add buffer overflow problems to a program that is always run as root. John -- John Polstra jdp@polstra.com John D. Polstra & Co., Inc. Seattle, Washington USA "Self-interest is the aphrodisiac of belief." -- James V. DeLong To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message