Date: Sun, 14 Jul 2002 13:35:43 +0200 (CEST) From: Alexander Leidinger <Alexander@Leidinger.net> To: cjc@FreeBSD.ORG Cc: freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory FreeBSD-SA-02:29.tcpdump Message-ID: <200207141135.g6EBZhxQ064314@Magelan.Leidinger.net> In-Reply-To: <20020714085734.GD56656@blossom.cjclark.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 14 Jul, Crist J. Clark wrote:
>> On a related matter: It would probably be a very good idea
>> for tcpdump to drop priviledges right after opening the BPF
>> device.
>
> tcpdump(8) never has elevated privileges. It just runs as whoever
> executes it. As you say, the way to run it at lower privileges is to
> give a less privileged user read access to the bpf(4) devices.
It could drop privileges (su to another UID like a never OpenSSH or
Apache does it) if it gets run by root...
Bye,
Alexander.
--
It's not a bug, it's tradition!
http://www.Leidinger.net Alexander @ Leidinger.net
GPG fingerprint = C518 BC70 E67F 143F BE91 3365 79E2 9C60 B006 3FE7
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200207141135.g6EBZhxQ064314>
