Re: [Wireshark-dev] GSoC 2013 Project Proposal for Root permissions in wireshark

2013-05-14 Thread Mohana Sai
Thanks. I don't know that GTK 2 and 3 co-exist. When the note came on the screen, I thought I need to remove the newer one as with the case with some software before installing the older versions. However, the command works, there is no need for me to install gtk2. :) Thanks, MohanaSai Cherukuri

Re: [Wireshark-dev] GSoC 2013 Project Proposal for Root permissions in wireshark

2013-05-13 Thread Mohana Sai
Is there a way to avoid downgrading GTK+ on ubuntu 12.04 before building wireshark? Thanks, MohanaSai Cherukuri ___ Sent via:Wireshark-dev mailing list Archives:http://www.wireshark.org/lists/wireshark-dev Unsubscrib

Re: [Wireshark-dev] GSoC 2013 Project Proposal for Root permissions in wireshark

2013-05-02 Thread Mohana Sai
While using privilege separation on linux systems,we can make the dumpcap an IPC service configured to run as root or system-started daemon running as root, the dumpcap can receive commands via IPC channels and will be held responsible for ensuring only right users are allowed to perform the comman

Re: [Wireshark-dev] GSoC 2013 Project Proposal for Root permissions in wireshark

2013-05-01 Thread Mohana Sai
> Most systems running Wireshark aren't Linux systems. Thanks. As in the ideas page the statement read " a way to capture packets on Linux and OS X" , only linux came to my mind. > BTW, TShark and Wireshark currently communicate with dumpcap using an, > err, umm, pipe > Currenlty in deb

Re: [Wireshark-dev] GSoC 2013 Project Proposal for Root permissions in wireshark

2013-05-01 Thread Mohana Sai
Sorry for not being specific in the previous mail. I was thinking about adding ACL to dumpcap file. And if many systems don't have D-Bus by default, we can use some IPC which is very common in linux systems (unix pipes came to mind, but not sure if it is supported in all linux systems and I read

Re: [Wireshark-dev] GSoC 2013 Project Proposal for Root permissions in wireshark

2013-05-01 Thread Mohana Sai
I am little confused about this project. What requirements the project doesn't meet if we use any of these 2 methods By simply adding ACL? By separating the code in to privileged part and unprivileged part and using DBus to communicate the privileged part with unprivileged one ? Regards, MohanaSa