Control: tags -1 confirmed

Hi,

Gunnar Wolf <[email protected]> ezt írta (időpont: 2025. okt. 14., K, 20:16):
>
> Package: stratoshark
> Version: 0.9.3-1
> Severity: normal
>
> I am a first-time strato user, trying to evaluate it. I tried to run it as
> a nonprivileged user, and got the following:
>
>     $ strato
>      ** (falcodump:553486) 12:13:15.657393 [falcodump WARNING] 
> ./extcap/falcodump.cpp:967 -- main(): Unable to open kmod: error opening 
> device /dev/scap0. Make sure you have root credentials and that the scap 
> module is loaded: No such file or directory
>
> However, if I try to run it as root, the first thing I see is:
>
>     # strato
>     Running as user "root" and group "root". This could be dangerous.
>
> This is quite confusing. Please try to lead to a situation where the user
> is not scolded whatever they do 😉

This is confusing indeed and there is no really good easy solution.
Upstream's packages run falcodump/dumpcalls as setuid root binaries
and I proposed following that scheme on debian-devel [1], but it was
pointed out that using PolicyKit for privilege escalation would be the
ideal and that's not implemented yet.

For testing it may be a good compromise to make falcodump setuid
locally and clear the setuid bit when the testing is finished.

Cheers,
Balint

[1] https://lists.debian.org/debian-devel/2025/10/msg00052.html

Reply via email to