This is indeed intentional--the default installation is safe in that it
doesn't come with SUID binaries, as it doesn't absolutely need to. (If
you're using check_ping rather than check_icmp and not using check_dhcp
at all, you'd never notice.) See /usr/share/doc/nagios-
plugins/README.Debian; you can override the permissions by doing the
following, as described there:
# dpkg-statoverride --update --add root nagios 4750
/usr/lib/nagios/plugins/check_dhcp
# dpkg-statoverride --update --add root nagios 4750
/usr/lib/nagios/plugins/check_icmp
This assumes that your nagios user belongs to a group called "nagios".
Using dpkg-statoverride ensures that the changed permissions will be
carried across upgrades. To see a list of your current overrides, run
dpkg-statoverride --list. It's also possible to use sudo to do the same,
but the statoverride is simpler and the result--the nagios user can run
these two plugins with root privileges--is precisely the same.
I'm marking this report "Invalid" because the configuration is not a
bug; it is designed to be safe but useless by default, and require
action from the system administrator to enable potentially unsafe
actions. I've also linked in an archived Debian bug report describing
this same issue.
** Changed in: nagios-plugins (Ubuntu)
Status: New => Invalid
--
could not bind socket check_dhcp
https://bugs.launchpad.net/bugs/156649
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs