On Wed, 23 Jun 2004, Matt Beaumont wrote:
> I've written a little patch to drop all but the CAP_NET_ADMIN and
> CAP_NET_RAW capabilities immediately if tcpdump is running with root
> privileges.  The idea is to limit the damage done by an exploit
> against tcpdump.
> 
> Some of the inspiration for this patch came from here:
> <http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/minimize-privileges.html>
> 
> This is the first patch I've ever submitted, so I'd love to hear some
> feedback :)

Hi,

Have you checked the code in the CVS?  It already includes a 
"droproot" option.

Yours is slightly different, though, as it uses (Linux-specific?) 
capabilities.  I'm not sure if it's necessary when we already drop the 
root privileges.

Please have a look.

Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

-
This is the tcpdump-workers list.
Visit https://lists.sandelman.ca/ to unsubscribe.

Reply via email to