allow -f option for non-root on Fedora 15 and newer remove read permissions on binaries for Fedora 14 and olderepel9
parent
df418b7209
commit
29242ef7a2
@ -0,0 +1,64 @@
|
||||
diff -up fping-2.4b2_to-ipv6/fping.8.capnetraw fping-2.4b2_to-ipv6/fping.8
|
||||
--- fping-2.4b2_to-ipv6/fping.8.capnetraw 2002-01-20 20:05:48.000000000 -0500
|
||||
+++ fping-2.4b2_to-ipv6/fping.8 2011-09-04 16:14:03.782482153 -0400
|
||||
@@ -88,10 +88,7 @@ fping a list of IP addresses as input an
|
||||
.IP \fB-e\fR 5
|
||||
Show elapsed (round-trip) time of packets.
|
||||
.IP \fB-f\fR 5
|
||||
-Read list of targets from a file. This option can only be used by the
|
||||
-root user. Regular users should pipe in the file via stdin:
|
||||
-
|
||||
-% fping < targets_file
|
||||
+Read list of targets from a file.
|
||||
|
||||
.IP \fB-g\fR 5
|
||||
Generate a target list from a supplied IP netmask, or a starting and ending IP.
|
||||
@@ -203,11 +200,9 @@ command line arguments, and 4 for a syst
|
||||
Ha! If we knew of any we would have fixed them!
|
||||
.SH RESTRICTIONS
|
||||
If certain options are used (i.e, a low value for -i and -t, and a
|
||||
-high value for -r) it is possible to flood the network. This program
|
||||
-must be installed as setuid root in order to open up a raw socket,
|
||||
-or must be run by root. In order to stop mere mortals from hosing the
|
||||
-network (when fping is installed setuid root) , normal users can't specify
|
||||
-the following:
|
||||
+high value for -r) it is possible to flood the network. In order to
|
||||
+stop mere mortals from hosing the network (when fping is installed
|
||||
+setuid root), normal users can't specify the following:
|
||||
.nf
|
||||
|
||||
-i n where n < 10 msec
|
||||
diff -up fping-2.4b2_to-ipv6/fping.c.capnetraw fping-2.4b2_to-ipv6/fping.c
|
||||
--- fping-2.4b2_to-ipv6/fping.c.capnetraw 2011-09-04 15:06:08.800668963 -0400
|
||||
+++ fping-2.4b2_to-ipv6/fping.c 2011-09-04 15:11:15.256781273 -0400
|
||||
@@ -410,17 +410,6 @@ int main( int argc, char **argv )
|
||||
int advance;
|
||||
struct protoent *proto;
|
||||
char *buf;
|
||||
- uid_t uid;
|
||||
- /* check if we are root */
|
||||
-
|
||||
- if( geteuid() )
|
||||
- {
|
||||
- fprintf( stderr,
|
||||
- "This program can only be run by root, or it must be setuid root.\n" );
|
||||
-
|
||||
- exit( 3 );
|
||||
-
|
||||
- }/* IF */
|
||||
|
||||
/* confirm that ICMP is available on this machine */
|
||||
#ifndef IPV6
|
||||
@@ -508,12 +497,6 @@ int main( int argc, char **argv )
|
||||
#endif
|
||||
#endif
|
||||
|
||||
- if( ( uid = getuid() ) )
|
||||
- {
|
||||
- seteuid( getuid() );
|
||||
-
|
||||
- }/* IF */
|
||||
-
|
||||
prog = argv[0];
|
||||
ident = getpid() & 0xFFFF;
|
||||
|
Loading…
Reference in new issue