Guy Harris wrote:
> Note also that there will be a configure-script option to enable this,
with the
> default being "no". Enabling remote capture increases the attack surface
of an
> application using libpcap, as it would receive messages from a
> not-necessarily-trusted remote host; the code to parse them needs to be
very
> careful. The code should, ideally, run without elevated privileges when
it's
> trying to open a remote capture source, as that's not needed, and, if
you're
> going to have a bigger attack surface, you don't want to run with elevated
> privileges.
Potentially, running rpcap:// over localhost may be a way to reduce need for
elevated priviledges.
Do you expect "tcpdump" to be the program run at the remote end, or will it
be something else?
> The stuff I'm working on has a table of URL schemes and routines to handle
> them, so that it could be extended to handle protocols other than rpcap.
For
> example, there could be "tcpdump+ssh", i.e. "ssh over to the remote
machine and
> run tcpdump", and there's a protocol that Wireshark dissects, in which
some
> 802.11 APs (Cisco and somebody else) send out packets over UDP -
Wildpackets'
> OmniPeek handles it directly, and it'd be nice if tcpdump/*Shark/etc.
could do
> so as well.
Yes to "tcpdump+ssh" URL...
--
] Never tell me the odds! | ipv6 mesh networks [
] Michael Richardson, Sandelman Software Works| network architect [
] m...@sandelman.ca http://www.sandelman.ca/| ruby on rails[
___
tcpdump-workers mailing list
tcpdump-workers@lists.tcpdump.org
https://lists.sandelman.ca/mailman/listinfo/tcpdump-workers