Launchpad has imported 4 comments from the remote bug at
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6124.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2011-07-14T16:54:03+00:00 Evan Huus wrote:

Build Information:
wireshark 1.6.0 (SVN Rev Unknown from unknown)

Copyright 1998-2011 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (32-bit) with GTK+ 2.24.5, with GLib 2.29.10, with libpcap 1.1.1, with
libz 1.2.3.4, with POSIX capabilities (Linux), without libpcre, with SMI 0.4.8,
with c-ares 1.7.4, with Lua 5.1, without Python, with GnuTLS 2.10.5, with Gcrypt
1.5.0, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built Jun 12
2011 13:08:27), without AirPcap.

Running on Linux 3.0.0-5-generic, with libpcap version 1.1.1, with libz 1.2.3.4,
GnuTLS 2.10.5, Gcrypt 1.5.0.

Built using gcc 4.6.1.
--
Starting wireshark produces the following warning in dmesg:

dumpcap uses obsolete (PF_INET,SOCK_PACKET)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/3

------------------------------------------------------------------------
On 2011-07-14T16:54:53+00:00 Evan Huus wrote:

Originally reported to the Ubuntu project:

https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/4

------------------------------------------------------------------------
On 2011-07-14T17:33:22+00:00 Gerald Combs wrote:

Wireshark doesn't open raw sockets directly. It relies on libpcap for
that. If you're running Wireshark without capture privileges (which is
the case according to the Launchpad bug) then this is most likely a
byproduct of pcap_activate_linux() in libpcap, which first tries to open
a socket using PF_PACKET and if that fails tries with PF_INET.

What happens if you run

  tcpdump -D ; dmesg | tail

on your system as a user without CAP_NET_ADMIN or CAP_NET_RAW
capabilities (i.e. a normal user)? On a natty system here I get

[600414.835927] tcpdump uses obsolete (PF_INET,SOCK_PACKET)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/5

------------------------------------------------------------------------
On 2011-07-14T18:04:20+00:00 Evan Huus wrote:

You're absolutely right. Thanks for such a quick reply!

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/6


** Changed in: wireshark
       Status: Invalid => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/809813

Title:
  dumpcap uses obsolete (PF_INET,SOCK_PACKET) at wireshark non-root
  start

To manage notifications about this bug go to:
https://bugs.launchpad.net/wireshark/+bug/809813/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to