[Winpcap-users] Feature request: restricting use of winpcap
Gianluca Varenni
gianluca.varenni at cacetech.com
Mon Aug 1 18:44:15 GMT 2005
Hi Phil.
As Loris explained some days ago on the mailing list
(http://www.winpcap.org/pipermail/winpcap-users/2005-July/000202.html) we
are definitely planning to add such feature, but it won't be available in
the upcoming WinPcap 3.1. The idea is putting some ACLs on the npf devices
to selectively allow/deny tx and rx through a control panel applet (or
something similar).
Have a nice day
GV
----- Original Message -----
From: "Ph. Marek" <philipp.marek at bmlv.gv.at>
To: <winpcap-users at winpcap.org>
Sent: Monday, August 01, 2005 1:14 AM
Subject: [Winpcap-users] Feature request: restricting use of winpcap
> Hello everybody!
>
> I'd like to do some packet reading/analysing in a script, giving
> information
> about the network status (sing cdp). That works beautifully parsing the
> tethereal output.
>
> What I don't want is giving users on the PC full sniffing capabilities.
> Is there a way to restrict communication between the npf driver and other
> applications, either by applying an acl to the npf device file, or setting
> some registry values to define a filter string and deny packet injection?
>
> I guess the easiest solution would be to set an acl - so the script (which
> runs in another security context) could do as it likes.
>
>
>
> Regards,
>
> Phil
> _______________________________________________
> Winpcap-users mailing list
> Winpcap-users at winpcap.org
> https://www.winpcap.org/mailman/listinfo/winpcap-users
>
More information about the Winpcap-users
mailing list