Date: Sat, 20 Apr 2002 16:27:18 -0600 From: Lyndon Nerenberg <lyndon@orthanc.ab.ca> To: cjclark@alum.mit.edu Cc: freebsd-current@FreeBSD.ORG Subject: Re: Adding a 'bpf' group for /dev/bpf* Message-ID: <200204202227.g3KMRIJ39147@orthanc.ab.ca> In-Reply-To: Your message of "Sat, 20 Apr 2002 15:11:52 PDT." <20020420151152.E76898@blossom.cjclark.org>
next in thread | previous in thread | raw e-mail | index | archive | help
>>>>> "Crist" == Crist J Clark <crist.clark@attbi.com> writes:
Crist> OK. Now you've really lost me. What do ports have to do with
Crist> this? Which ports? None of the sniffing programs I am aware
Crist> of use set{g,u}id bits. They rely on the permissions of the
Crist> user running them.
Sorry -- keyboard and brain disconnect on my part. What I was trying to
get at was the need to run sniffers as root by default. The fewer
things that need to be run as root, the better (e.g. I don't want snort
and trafdump running as root on my firewalls if I can avoid it).
Programs like snort can attempt to lose uid-0 after opening the bpf
device, but others like tcpdump do not.
As David Wolfskill mentioned in a previous message, this idea is the
same as how the operator group is used for dump. kmem did the same
thing for ps and top.
--lyndon
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200204202227.g3KMRIJ39147>
