https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=236819

            Bug ID: 236819
           Summary: [tcpdump] capsicum-related changes broke reading IPsec
                    ESP decryption keys from a file
           Product: Base System
           Version: 11.2-STABLE
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: bin
          Assignee: n...@freebsd.org
          Reporter: eu...@freebsd.org

tcpdump(8) manual page documents command line option -E that may involve
reading keys from a file:

              In addition to the above syntax, the syntax ``file name'' may be
              used to have tcpdump read the provided file in. The file is
              opened upon receiving the first ESP packet, so any special
              permissions that tcpdump may have been given should already have
              been given up.

This is currently broken in stable/11:

# tcpdump -E 'file /tmp/keys.txt' -s0 -np -i em0 host 1.1.1.1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em0, link-type EN10MB (Ethernet), capture size 262144 bytes
tcpdump: print_esp: can't open /tmp/keys.txt: Not permitted in capability mode

-- 
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Reply via email to