diff options
author | Jan Wagner <waja@cyconet.org> | 2014-07-06 10:58:04 (GMT) |
---|---|---|
committer | Jan Wagner <waja@cyconet.org> | 2014-07-06 11:29:24 (GMT) |
commit | ba21e26443385dd283d08e0419ff6ff25fedd0e8 (patch) | |
tree | f4b531a4b6a39bfc195c23c23fd80d7fbae176cd /plugins-root | |
parent | 1a0467f672ae7a3cb8ecf35e9cbedc0cb4c6124e (diff) | |
download | monitoring-plugins-ba21e26443385dd283d08e0419ff6ff25fedd0e8.tar.gz |
check_icmp/check_dhcp: disable check, if we are root
As it is possible to use capabilities(7) on linux or solaris
privileges for example, it is not necessary in all cases to
have those binaries making use of setuid.
Diffstat (limited to 'plugins-root')
-rw-r--r-- | plugins-root/check_dhcp.c | 3 | ||||
-rw-r--r-- | plugins-root/check_icmp.c | 3 |
2 files changed, 0 insertions, 6 deletions
diff --git a/plugins-root/check_dhcp.c b/plugins-root/check_dhcp.c index b69a10d..b874c55 100644 --- a/plugins-root/check_dhcp.c +++ b/plugins-root/check_dhcp.c | |||
@@ -270,9 +270,6 @@ int main(int argc, char **argv){ | |||
270 | usage4 (_("Could not parse arguments")); | 270 | usage4 (_("Could not parse arguments")); |
271 | } | 271 | } |
272 | 272 | ||
273 | /* this plugin almost certainly needs root permissions. */ | ||
274 | np_warn_if_not_root(); | ||
275 | |||
276 | /* create socket for DHCP communications */ | 273 | /* create socket for DHCP communications */ |
277 | dhcp_socket=create_dhcp_socket(); | 274 | dhcp_socket=create_dhcp_socket(); |
278 | 275 | ||
diff --git a/plugins-root/check_icmp.c b/plugins-root/check_icmp.c index 4b4197d..8b563e4 100644 --- a/plugins-root/check_icmp.c +++ b/plugins-root/check_icmp.c | |||
@@ -383,9 +383,6 @@ main(int argc, char **argv) | |||
383 | bindtextdomain (PACKAGE, LOCALEDIR); | 383 | bindtextdomain (PACKAGE, LOCALEDIR); |
384 | textdomain (PACKAGE); | 384 | textdomain (PACKAGE); |
385 | 385 | ||
386 | /* print a helpful error message if geteuid != 0 */ | ||
387 | np_warn_if_not_root(); | ||
388 | |||
389 | /* we only need to be setsuid when we get the sockets, so do | 386 | /* we only need to be setsuid when we get the sockets, so do |
390 | * that before pointer magic (esp. on network data) */ | 387 | * that before pointer magic (esp. on network data) */ |
391 | icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0; | 388 | icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0; |