[mailto:wireshark-dev-boun...@wireshark.org] On Behalf Of Mohana Sai
Sent: den 14 maj 2013 06:15
To: Developer support list for Wireshark
Subject: Re: [Wireshark-dev] GSoC 2013 Project Proposal for Root permissions in
wireshark
Is there a way to avoid downgrading GTK+ on ubuntu 12.04 before building
Thanks. I don't know that GTK 2 and 3 co-exist. When the note came on the
screen, I thought I need to remove the newer one as with the case with some
software before installing the older versions.
However, the command works, there is no need for me to install gtk2. :)
Thanks,
MohanaSai Cherukuri
Is there a way to avoid downgrading GTK+ on ubuntu 12.04 before building
wireshark?
Thanks,
MohanaSai Cherukuri
___
Sent via:Wireshark-dev mailing list wireshark-dev@wireshark.org
Archives:
While using privilege separation on linux systems,we can make the dumpcap
an IPC service configured to run as root or system-started daemon running
as root, the dumpcap can receive commands via IPC channels and will be held
responsible for ensuring only right users are allowed to perform the
I am little confused about this project. What requirements the project
doesn't meet if we use any of these 2 methods
By simply adding ACL?
By separating the code in to privileged part and unprivileged part and
using DBus to communicate the privileged part with unprivileged one ?
Regards,
On May 1, 2013, at 10:48 AM, Mohana Sai mohanasai...@gmail.com wrote:
I am little confused about this project. What requirements the project
doesn't meet if we use any of these 2 methods
By simply adding ACL?
Adding an ACL to what?
By separating the code in to privileged part and
Sorry for not being specific in the previous mail.
I was thinking about adding ACL to dumpcap file.
And if many systems don't have D-Bus by default, we can use some IPC which
is very common in linux systems (unix pipes came to mind, but not sure if
it is supported in all linux systems and I read
On May 1, 2013, at 8:58 PM, Mohana Sai mohanasai...@gmail.com wrote:
Sorry for not being specific in the previous mail.
I was thinking about adding ACL to dumpcap file.
I.e., set an ACL limiting who is allowed to execute it?
Do *ALL* file systems on which dumpcap might reside support ACLs?
Most systems running Wireshark aren't Linux systems.
Thanks. As in the ideas page the statement read a way to capture
packets on Linux and OS X , only linux came to my mind.
BTW, TShark and Wireshark currently communicate with dumpcap using an,
err, umm, pipe
Currenlty in debian
On 4/28/13 12:02 PM, Guy Harris wrote:
On Apr 28, 2013, at 7:43 AM, Surbhi Jain jainsurbhi...@gmail.com wrote:
When we install WIRESHARK or most of the softwares on any distro, window
prompts up asking for root password. When the installation of the software
starts, can't we run a script
On Apr 29, 2013, at 9:26 AM, Gerald Combs ger...@wireshark.org wrote:
One of the problems with this approach is that new, inaccessbile bpf
devices can be created at any time.
Ultimately, that'a deficiency of OS X - it *should* use cloning BPF devices.
Sir
I got your point regarding the security as it depends on wired or wireless
network or further the internal network design of an organisation and the
WEP/WPA security of their network.
When we install WIRESHARK or most of the softwares on any distro, window
prompts up asking for root
On Apr 28, 2013, at 7:43 AM, Surbhi Jain jainsurbhi...@gmail.com wrote:
When we install WIRESHARK or most of the softwares on any distro, window
prompts up asking for root password. When the installation of the software
starts, can't we run a script which will allow the logged in user or
Would it mean that end user can also capture traffic which won't belong to
him or if he is not the owner of the packet? Security has no concern for
capturing packets?
Root permissions are therefore OS dependent? Am I right?
Or are we supposed to edit the dumpcap file.
Surbhi Jain
3rd year ,
On Apr 25, 2013, at 7:26 AM, Surbhi Jain jainsurbhi...@gmail.com wrote:
Would it mean that end user can also capture traffic which won't belong to
him or if he is not the owner of the packet? Security has no concern for
capturing packets?
If somebody's concerned about capturing third-party
On Apr 24, 2013, at 7:24 AM, Surbhi Jain jainsurbhi...@gmail.com wrote:
Hi all,
A normal user must have the permissions to capture and view the packet info.
till layer 5 if that belongs to his request from server.
He can be able to save a packet, to delete a packet, to edit a packet and
Hi all,
A normal user must have the permissions to capture and view the packet
info. till layer 5 if that belongs to his request from server. He can be
able to save a packet, to delete a packet, to edit a packet and sent it
back to the server.
Packet contains the info for the identification of
On 04/24/2013 10:24 AM, Surbhi Jain wrote:
Hi all,
A normal user must have the permissions to capture and view the packet
info. till layer 5 if that belongs to his request from server. He can be
able to save a packet, to delete a packet, to edit a packet and sent it
back to the server.
18 matches
Mail list logo