Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 14 Jul 2002 13:35:43 +0200 (CEST)
From:      Alexander Leidinger <Alexander@Leidinger.net>
To:        cjc@FreeBSD.ORG
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-02:29.tcpdump
Message-ID:  <200207141135.g6EBZhxQ064314@Magelan.Leidinger.net>
In-Reply-To: <20020714085734.GD56656@blossom.cjclark.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 14 Jul, Crist J. Clark wrote:

>> On a related matter:  It would probably be a very good idea
>> for tcpdump to drop priviledges right after opening the BPF
>> device.
> 
> tcpdump(8) never has elevated privileges. It just runs as whoever
> executes it. As you say, the way to run it at lower privileges is to
> give a less privileged user read access to the bpf(4) devices.

It could drop privileges (su to another UID like a never OpenSSH or
Apache does it) if it gets run by root...

Bye,
Alexander.

-- 
                   It's not a bug, it's tradition!

http://www.Leidinger.net                       Alexander @ Leidinger.net
  GPG fingerprint = C518 BC70 E67F 143F BE91  3365 79E2 9C60 B006 3FE7


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200207141135.g6EBZhxQ064314>