Launchpad has imported 4 comments from the remote bug at http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6124.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2011-07-14T16:54:03+00:00 Evan Huus wrote: Build Information: wireshark 1.6.0 (SVN Rev Unknown from unknown) Copyright 1998-2011 Gerald Combs <[email protected]> and contributors. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Compiled (32-bit) with GTK+ 2.24.5, with GLib 2.29.10, with libpcap 1.1.1, with libz 1.2.3.4, with POSIX capabilities (Linux), without libpcre, with SMI 0.4.8, with c-ares 1.7.4, with Lua 5.1, without Python, with GnuTLS 2.10.5, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built Jun 12 2011 13:08:27), without AirPcap. Running on Linux 3.0.0-5-generic, with libpcap version 1.1.1, with libz 1.2.3.4, GnuTLS 2.10.5, Gcrypt 1.5.0. Built using gcc 4.6.1. -- Starting wireshark produces the following warning in dmesg: dumpcap uses obsolete (PF_INET,SOCK_PACKET) Reply at: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/3 ------------------------------------------------------------------------ On 2011-07-14T16:54:53+00:00 Evan Huus wrote: Originally reported to the Ubuntu project: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813 Reply at: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/4 ------------------------------------------------------------------------ On 2011-07-14T17:33:22+00:00 Gerald Combs wrote: Wireshark doesn't open raw sockets directly. It relies on libpcap for that. If you're running Wireshark without capture privileges (which is the case according to the Launchpad bug) then this is most likely a byproduct of pcap_activate_linux() in libpcap, which first tries to open a socket using PF_PACKET and if that fails tries with PF_INET. What happens if you run tcpdump -D ; dmesg | tail on your system as a user without CAP_NET_ADMIN or CAP_NET_RAW capabilities (i.e. a normal user)? On a natty system here I get [600414.835927] tcpdump uses obsolete (PF_INET,SOCK_PACKET) Reply at: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/5 ------------------------------------------------------------------------ On 2011-07-14T18:04:20+00:00 Evan Huus wrote: You're absolutely right. Thanks for such a quick reply! Reply at: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/809813/comments/6 ** Changed in: wireshark Status: Invalid => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/809813 Title: dumpcap uses obsolete (PF_INET,SOCK_PACKET) at wireshark non-root start To manage notifications about this bug go to: https://bugs.launchpad.net/wireshark/+bug/809813/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
