Re: [tcpdump-workers] [libpcap] [Patch] rpcap:// support (#266)

2014-05-26 Thread Michael Richardson

Guy Harris  wrote:
> information (which should NOT be supplied in the URL, as that can show up 
in
> the output of ps!) or "we're running over SSL/TLS but the certificate has
> expired, so do you want me to continue or not?" information or

Could we put a hash of the public key in the URL?

> This is a work in progress. I have something based on Jakub's patch 
compiling
> (on OS X, so I ripped out the check for Linux and the Linuxisms), along 
with
> the rpcap daemon, but it still needs work.

--
]   Never tell me the odds! | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works| network architect  [
] m...@sandelman.ca  http://www.sandelman.ca/|   ruby on rails[

___
tcpdump-workers mailing list
tcpdump-workers@lists.tcpdump.org
https://lists.sandelman.ca/mailman/listinfo/tcpdump-workers


Re: [tcpdump-workers] [libpcap] [Patch] rpcap:// support (#266)

2014-05-26 Thread Michael Richardson

Guy Harris  wrote:
> Note also that there will be a configure-script option to enable this, 
with the
> default being "no". Enabling remote capture increases the attack surface 
of an
> application using libpcap, as it would receive messages from a
> not-necessarily-trusted remote host; the code to parse them needs to be 
very
> careful. The code should, ideally, run without elevated privileges when 
it's
> trying to open a remote capture source, as that's not needed, and, if 
you're
> going to have a bigger attack surface, you don't want to run with elevated
> privileges.

Potentially, running rpcap:// over localhost may be a way to reduce need for
elevated priviledges.

Do you expect "tcpdump" to be the program run at the remote end, or will it
be something else?

> The stuff I'm working on has a table of URL schemes and routines to handle
> them, so that it could be extended to handle protocols other than rpcap. 
For
> example, there could be "tcpdump+ssh", i.e. "ssh over to the remote 
machine and
> run tcpdump", and there's a protocol that Wireshark dissects, in which 
some
> 802.11 APs (Cisco and somebody else) send out packets over UDP - 
Wildpackets'
> OmniPeek handles it directly, and it'd be nice if tcpdump/*Shark/etc. 
could do
> so as well.

Yes to "tcpdump+ssh" URL...

--
]   Never tell me the odds! | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works| network architect  [
] m...@sandelman.ca  http://www.sandelman.ca/|   ruby on rails[





___
tcpdump-workers mailing list
tcpdump-workers@lists.tcpdump.org
https://lists.sandelman.ca/mailman/listinfo/tcpdump-workers