From 398e06e8751f75135c9ca6f4020a79b789330c22 Mon Sep 17 00:00:00 2001 From: Bill Meier Date: Mon, 24 Mar 2008 18:32:15 +0000 Subject: Fix a few typos. svn path=/trunk/; revision=24724 --- dumpcap.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'dumpcap.c') diff --git a/dumpcap.c b/dumpcap.c index 89371d262b..2f00b6d1e6 100644 --- a/dumpcap.c +++ b/dumpcap.c @@ -2365,10 +2365,10 @@ main(int argc, char *argv[]) /* capabilities; Drop all other capabilities; */ /* - If not -w (ie: doing -S or -D, etc) run to completion; */ /* else: after pcap_open_live() in capture_loop_open_input() */ - /* drop all capabilities (NET_RAW and NET_ADMIN) */ + /* drop all capabilities (NET_RAW and NET_ADMIN); */ /* (Note: this means that the process, although logged in */ /* as root, does not have various permissions such as the */ - /* ability to bypass file access permissions. */ + /* ability to bypass file access permissions). */ /* XXX: Should we just leave capabilities alone in this case */ /* so that user gets expected effect that root can do */ /* anything ?? */ @@ -2377,17 +2377,17 @@ main(int argc, char *argv[]) /* Action: */ /* - If not -w (ie: doing -S or -D, etc) run to completion; */ /* else: after pcap_open_live() in capture_loop_open_input() */ - /* drop same (euid=ruid). (ie: keep suid until after */ - /* pcap_open_live */ + /* drop suid root (set euid=ruid).(ie: keep suid until after */ + /* pcap_open_live). */ /* */ /* 5. Running as suid root (euid=0, ruid=n); Using libcap. */ /* Action: */ /* - Near start of program: Enable NET_RAW and NET_ADMIN */ /* capabilities; Drop all other capabilities; */ - /* Drop suid privileges (euid=ruid). */ + /* Drop suid privileges (euid=ruid); */ /* - If not -w (ie: doing -S or -D, etc) run to completion; */ /* else: after pcap_open_live() in capture_loop_open_input() */ - /* drop all capabilities (NET_RAW and NET_ADMIN) */ + /* drop all capabilities (NET_RAW and NET_ADMIN). */ /* */ /* XXX: For some Linux versions/distros with capabilities */ /* a 'normal' process with any capabilities cannot be */ -- cgit v1.2.1