Guy Harris <notificati...@github.com> wrote:
    > Note also that there will be a configure-script option to enable this, 
with the
    > default being "no". Enabling remote capture increases the attack surface 
of an
    > application using libpcap, as it would receive messages from a
    > not-necessarily-trusted remote host; the code to parse them needs to be 
very
    > careful. The code should, ideally, run without elevated privileges when 
it's
    > trying to open a remote capture source, as that's not needed, and, if 
you're
    > going to have a bigger attack surface, you don't want to run with elevated
    > privileges.

Potentially, running rpcap:// over localhost may be a way to reduce need for
elevated priviledges.

Do you expect "tcpdump" to be the program run at the remote end, or will it
be something else?

    > The stuff I'm working on has a table of URL schemes and routines to handle
    > them, so that it could be extended to handle protocols other than rpcap. 
For
    > example, there could be "tcpdump+ssh", i.e. "ssh over to the remote 
machine and
    > run tcpdump", and there's a protocol that Wireshark dissects, in which 
some
    > 802.11 APs (Cisco and somebody else) send out packets over UDP - 
Wildpackets'
    > OmniPeek handles it directly, and it'd be nice if tcpdump/*Shark/etc. 
could do
    > so as well.

Yes to "tcpdump+ssh" URL...

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        | network architect  [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [





_______________________________________________
tcpdump-workers mailing list
tcpdump-workers@lists.tcpdump.org
https://lists.sandelman.ca/mailman/listinfo/tcpdump-workers

Reply via email to