Why am I able to open Wireshark and capture packets in macOS without root privileges?
As far as I know, capturing packets using Wireshark requires root/administrator privileges. In Windows, it prompts for UAC elevation and runs with administrative privileges. The same thing in Ubuntu; it prompts for a password to authorize access before showing me the interfaces.
However, in macOS, there is no authorization required. I don't have to enter a password. Instead, Wireshark is directly showing me the interfaces and I am able to capture packets.
How is Wireshark able to do this on macOS? What is special about macOS that allows interfaces and packets to be monitored without administrative access?
root wireshark
add a comment |
As far as I know, capturing packets using Wireshark requires root/administrator privileges. In Windows, it prompts for UAC elevation and runs with administrative privileges. The same thing in Ubuntu; it prompts for a password to authorize access before showing me the interfaces.
However, in macOS, there is no authorization required. I don't have to enter a password. Instead, Wireshark is directly showing me the interfaces and I am able to capture packets.
How is Wireshark able to do this on macOS? What is special about macOS that allows interfaces and packets to be monitored without administrative access?
root wireshark
What kind of wireshark are you running? GUI (app) or command line?
– IconDaemon
Feb 27 at 12:40
Did you login as a standard user or as an administrator user?
– jksoegaard
Feb 27 at 12:40
The question in the title and the question in the body of your post aren't the same. The reason why you can open Wireshark without root privileges is because you can use it to analyze packet dumps, which are just ordinary files.
– Mark
Feb 27 at 20:53
@IconDaemon I am talking about GUI app.
– scipsycho
Feb 28 at 14:16
add a comment |
As far as I know, capturing packets using Wireshark requires root/administrator privileges. In Windows, it prompts for UAC elevation and runs with administrative privileges. The same thing in Ubuntu; it prompts for a password to authorize access before showing me the interfaces.
However, in macOS, there is no authorization required. I don't have to enter a password. Instead, Wireshark is directly showing me the interfaces and I am able to capture packets.
How is Wireshark able to do this on macOS? What is special about macOS that allows interfaces and packets to be monitored without administrative access?
root wireshark
As far as I know, capturing packets using Wireshark requires root/administrator privileges. In Windows, it prompts for UAC elevation and runs with administrative privileges. The same thing in Ubuntu; it prompts for a password to authorize access before showing me the interfaces.
However, in macOS, there is no authorization required. I don't have to enter a password. Instead, Wireshark is directly showing me the interfaces and I am able to capture packets.
How is Wireshark able to do this on macOS? What is special about macOS that allows interfaces and packets to be monitored without administrative access?
root wireshark
root wireshark
edited Feb 28 at 6:42
jksoegaard
20k2150
20k2150
asked Feb 27 at 12:04
scipsychoscipsycho
12910
12910
What kind of wireshark are you running? GUI (app) or command line?
– IconDaemon
Feb 27 at 12:40
Did you login as a standard user or as an administrator user?
– jksoegaard
Feb 27 at 12:40
The question in the title and the question in the body of your post aren't the same. The reason why you can open Wireshark without root privileges is because you can use it to analyze packet dumps, which are just ordinary files.
– Mark
Feb 27 at 20:53
@IconDaemon I am talking about GUI app.
– scipsycho
Feb 28 at 14:16
add a comment |
What kind of wireshark are you running? GUI (app) or command line?
– IconDaemon
Feb 27 at 12:40
Did you login as a standard user or as an administrator user?
– jksoegaard
Feb 27 at 12:40
The question in the title and the question in the body of your post aren't the same. The reason why you can open Wireshark without root privileges is because you can use it to analyze packet dumps, which are just ordinary files.
– Mark
Feb 27 at 20:53
@IconDaemon I am talking about GUI app.
– scipsycho
Feb 28 at 14:16
What kind of wireshark are you running? GUI (app) or command line?
– IconDaemon
Feb 27 at 12:40
What kind of wireshark are you running? GUI (app) or command line?
– IconDaemon
Feb 27 at 12:40
Did you login as a standard user or as an administrator user?
– jksoegaard
Feb 27 at 12:40
Did you login as a standard user or as an administrator user?
– jksoegaard
Feb 27 at 12:40
The question in the title and the question in the body of your post aren't the same. The reason why you can open Wireshark without root privileges is because you can use it to analyze packet dumps, which are just ordinary files.
– Mark
Feb 27 at 20:53
The question in the title and the question in the body of your post aren't the same. The reason why you can open Wireshark without root privileges is because you can use it to analyze packet dumps, which are just ordinary files.
– Mark
Feb 27 at 20:53
@IconDaemon I am talking about GUI app.
– scipsycho
Feb 28 at 14:16
@IconDaemon I am talking about GUI app.
– scipsycho
Feb 28 at 14:16
add a comment |
1 Answer
1
active
oldest
votes
The reason is that the Wireshark installer installs a LaunchDaemon (i.e. something that runs with superuser privileges on boot) for setting special permissions to capture network packets. More specifically you can look at the file /Library/LaunchDaemon/org.wireshark.ChmodBPF.plist
to see what it does and when it is run.
As creating these LaunchDaemons require superuser privileges in itself, the Wireshark installer requires you to be a superuser (i.e. you have to enter an administrator user password to install the software).
If you look at the actual script run by the LaunchDaemon in /Library/Application Support/Wireshark/ChmodBPF/ChmodBPF
, you'll see that it creates 256 devices entries /dev/bpf0 to /dev/bpf255 and sets to that everyone in the access_bpf group can read and write to these device files.
The access_bpf groups is actually also created by Wireshark installer. This also requires superuser privileges. If you open System Preferences and then Users & Groups, you'll be able to fold out the "Groups" part of the tree and see "access_bpf" listed there. You can then add/remove users from that group to give or remove permission to capture network packets within Wireshark.
How do thesebpf
devices work exactly? Does this imply there' a performance-cost to having wireshark installed, even when not capturing?
– Alexander
Feb 28 at 2:23
At what level do you want the explanation? (I.e. are you home user, programmer, kernel developer?). In general terms they work like any other device. A program reads from the device and receives data. In this case the data is network packets. The program uses ioctl() to configure which NIC to listen on, set packet filters, etc. BPF is a common system which is also available on other systems like FreeBSD, Linux, etc. It does not mean that there’s a performance cost to having Wireshark installed. BPF is not a part of Wireshark, it is a standard part of the macOS kernel (Darwin).
– jksoegaard
Feb 28 at 6:38
I'm a dev, but not a kernel dev. What I was thinking was "does all network traffic have to be piped through these devices, so that it could be intercepted for logging by wireshark, whether wireshark is actually capturing or not?"?
– Alexander
Feb 28 at 17:29
No, it doesn't work like that at all.
– jksoegaard
Feb 28 at 17:40
1
Just open Terminal.app on any Mac and run the command: "man bpf"
– jksoegaard
Feb 28 at 19:39
|
show 1 more comment
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "118"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fapple.stackexchange.com%2fquestions%2f352593%2fwhy-am-i-able-to-open-wireshark-and-capture-packets-in-macos-without-root-privil%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
The reason is that the Wireshark installer installs a LaunchDaemon (i.e. something that runs with superuser privileges on boot) for setting special permissions to capture network packets. More specifically you can look at the file /Library/LaunchDaemon/org.wireshark.ChmodBPF.plist
to see what it does and when it is run.
As creating these LaunchDaemons require superuser privileges in itself, the Wireshark installer requires you to be a superuser (i.e. you have to enter an administrator user password to install the software).
If you look at the actual script run by the LaunchDaemon in /Library/Application Support/Wireshark/ChmodBPF/ChmodBPF
, you'll see that it creates 256 devices entries /dev/bpf0 to /dev/bpf255 and sets to that everyone in the access_bpf group can read and write to these device files.
The access_bpf groups is actually also created by Wireshark installer. This also requires superuser privileges. If you open System Preferences and then Users & Groups, you'll be able to fold out the "Groups" part of the tree and see "access_bpf" listed there. You can then add/remove users from that group to give or remove permission to capture network packets within Wireshark.
How do thesebpf
devices work exactly? Does this imply there' a performance-cost to having wireshark installed, even when not capturing?
– Alexander
Feb 28 at 2:23
At what level do you want the explanation? (I.e. are you home user, programmer, kernel developer?). In general terms they work like any other device. A program reads from the device and receives data. In this case the data is network packets. The program uses ioctl() to configure which NIC to listen on, set packet filters, etc. BPF is a common system which is also available on other systems like FreeBSD, Linux, etc. It does not mean that there’s a performance cost to having Wireshark installed. BPF is not a part of Wireshark, it is a standard part of the macOS kernel (Darwin).
– jksoegaard
Feb 28 at 6:38
I'm a dev, but not a kernel dev. What I was thinking was "does all network traffic have to be piped through these devices, so that it could be intercepted for logging by wireshark, whether wireshark is actually capturing or not?"?
– Alexander
Feb 28 at 17:29
No, it doesn't work like that at all.
– jksoegaard
Feb 28 at 17:40
1
Just open Terminal.app on any Mac and run the command: "man bpf"
– jksoegaard
Feb 28 at 19:39
|
show 1 more comment
The reason is that the Wireshark installer installs a LaunchDaemon (i.e. something that runs with superuser privileges on boot) for setting special permissions to capture network packets. More specifically you can look at the file /Library/LaunchDaemon/org.wireshark.ChmodBPF.plist
to see what it does and when it is run.
As creating these LaunchDaemons require superuser privileges in itself, the Wireshark installer requires you to be a superuser (i.e. you have to enter an administrator user password to install the software).
If you look at the actual script run by the LaunchDaemon in /Library/Application Support/Wireshark/ChmodBPF/ChmodBPF
, you'll see that it creates 256 devices entries /dev/bpf0 to /dev/bpf255 and sets to that everyone in the access_bpf group can read and write to these device files.
The access_bpf groups is actually also created by Wireshark installer. This also requires superuser privileges. If you open System Preferences and then Users & Groups, you'll be able to fold out the "Groups" part of the tree and see "access_bpf" listed there. You can then add/remove users from that group to give or remove permission to capture network packets within Wireshark.
How do thesebpf
devices work exactly? Does this imply there' a performance-cost to having wireshark installed, even when not capturing?
– Alexander
Feb 28 at 2:23
At what level do you want the explanation? (I.e. are you home user, programmer, kernel developer?). In general terms they work like any other device. A program reads from the device and receives data. In this case the data is network packets. The program uses ioctl() to configure which NIC to listen on, set packet filters, etc. BPF is a common system which is also available on other systems like FreeBSD, Linux, etc. It does not mean that there’s a performance cost to having Wireshark installed. BPF is not a part of Wireshark, it is a standard part of the macOS kernel (Darwin).
– jksoegaard
Feb 28 at 6:38
I'm a dev, but not a kernel dev. What I was thinking was "does all network traffic have to be piped through these devices, so that it could be intercepted for logging by wireshark, whether wireshark is actually capturing or not?"?
– Alexander
Feb 28 at 17:29
No, it doesn't work like that at all.
– jksoegaard
Feb 28 at 17:40
1
Just open Terminal.app on any Mac and run the command: "man bpf"
– jksoegaard
Feb 28 at 19:39
|
show 1 more comment
The reason is that the Wireshark installer installs a LaunchDaemon (i.e. something that runs with superuser privileges on boot) for setting special permissions to capture network packets. More specifically you can look at the file /Library/LaunchDaemon/org.wireshark.ChmodBPF.plist
to see what it does and when it is run.
As creating these LaunchDaemons require superuser privileges in itself, the Wireshark installer requires you to be a superuser (i.e. you have to enter an administrator user password to install the software).
If you look at the actual script run by the LaunchDaemon in /Library/Application Support/Wireshark/ChmodBPF/ChmodBPF
, you'll see that it creates 256 devices entries /dev/bpf0 to /dev/bpf255 and sets to that everyone in the access_bpf group can read and write to these device files.
The access_bpf groups is actually also created by Wireshark installer. This also requires superuser privileges. If you open System Preferences and then Users & Groups, you'll be able to fold out the "Groups" part of the tree and see "access_bpf" listed there. You can then add/remove users from that group to give or remove permission to capture network packets within Wireshark.
The reason is that the Wireshark installer installs a LaunchDaemon (i.e. something that runs with superuser privileges on boot) for setting special permissions to capture network packets. More specifically you can look at the file /Library/LaunchDaemon/org.wireshark.ChmodBPF.plist
to see what it does and when it is run.
As creating these LaunchDaemons require superuser privileges in itself, the Wireshark installer requires you to be a superuser (i.e. you have to enter an administrator user password to install the software).
If you look at the actual script run by the LaunchDaemon in /Library/Application Support/Wireshark/ChmodBPF/ChmodBPF
, you'll see that it creates 256 devices entries /dev/bpf0 to /dev/bpf255 and sets to that everyone in the access_bpf group can read and write to these device files.
The access_bpf groups is actually also created by Wireshark installer. This also requires superuser privileges. If you open System Preferences and then Users & Groups, you'll be able to fold out the "Groups" part of the tree and see "access_bpf" listed there. You can then add/remove users from that group to give or remove permission to capture network packets within Wireshark.
answered Feb 27 at 12:47
jksoegaardjksoegaard
20k2150
20k2150
How do thesebpf
devices work exactly? Does this imply there' a performance-cost to having wireshark installed, even when not capturing?
– Alexander
Feb 28 at 2:23
At what level do you want the explanation? (I.e. are you home user, programmer, kernel developer?). In general terms they work like any other device. A program reads from the device and receives data. In this case the data is network packets. The program uses ioctl() to configure which NIC to listen on, set packet filters, etc. BPF is a common system which is also available on other systems like FreeBSD, Linux, etc. It does not mean that there’s a performance cost to having Wireshark installed. BPF is not a part of Wireshark, it is a standard part of the macOS kernel (Darwin).
– jksoegaard
Feb 28 at 6:38
I'm a dev, but not a kernel dev. What I was thinking was "does all network traffic have to be piped through these devices, so that it could be intercepted for logging by wireshark, whether wireshark is actually capturing or not?"?
– Alexander
Feb 28 at 17:29
No, it doesn't work like that at all.
– jksoegaard
Feb 28 at 17:40
1
Just open Terminal.app on any Mac and run the command: "man bpf"
– jksoegaard
Feb 28 at 19:39
|
show 1 more comment
How do thesebpf
devices work exactly? Does this imply there' a performance-cost to having wireshark installed, even when not capturing?
– Alexander
Feb 28 at 2:23
At what level do you want the explanation? (I.e. are you home user, programmer, kernel developer?). In general terms they work like any other device. A program reads from the device and receives data. In this case the data is network packets. The program uses ioctl() to configure which NIC to listen on, set packet filters, etc. BPF is a common system which is also available on other systems like FreeBSD, Linux, etc. It does not mean that there’s a performance cost to having Wireshark installed. BPF is not a part of Wireshark, it is a standard part of the macOS kernel (Darwin).
– jksoegaard
Feb 28 at 6:38
I'm a dev, but not a kernel dev. What I was thinking was "does all network traffic have to be piped through these devices, so that it could be intercepted for logging by wireshark, whether wireshark is actually capturing or not?"?
– Alexander
Feb 28 at 17:29
No, it doesn't work like that at all.
– jksoegaard
Feb 28 at 17:40
1
Just open Terminal.app on any Mac and run the command: "man bpf"
– jksoegaard
Feb 28 at 19:39
How do these
bpf
devices work exactly? Does this imply there' a performance-cost to having wireshark installed, even when not capturing?– Alexander
Feb 28 at 2:23
How do these
bpf
devices work exactly? Does this imply there' a performance-cost to having wireshark installed, even when not capturing?– Alexander
Feb 28 at 2:23
At what level do you want the explanation? (I.e. are you home user, programmer, kernel developer?). In general terms they work like any other device. A program reads from the device and receives data. In this case the data is network packets. The program uses ioctl() to configure which NIC to listen on, set packet filters, etc. BPF is a common system which is also available on other systems like FreeBSD, Linux, etc. It does not mean that there’s a performance cost to having Wireshark installed. BPF is not a part of Wireshark, it is a standard part of the macOS kernel (Darwin).
– jksoegaard
Feb 28 at 6:38
At what level do you want the explanation? (I.e. are you home user, programmer, kernel developer?). In general terms they work like any other device. A program reads from the device and receives data. In this case the data is network packets. The program uses ioctl() to configure which NIC to listen on, set packet filters, etc. BPF is a common system which is also available on other systems like FreeBSD, Linux, etc. It does not mean that there’s a performance cost to having Wireshark installed. BPF is not a part of Wireshark, it is a standard part of the macOS kernel (Darwin).
– jksoegaard
Feb 28 at 6:38
I'm a dev, but not a kernel dev. What I was thinking was "does all network traffic have to be piped through these devices, so that it could be intercepted for logging by wireshark, whether wireshark is actually capturing or not?"?
– Alexander
Feb 28 at 17:29
I'm a dev, but not a kernel dev. What I was thinking was "does all network traffic have to be piped through these devices, so that it could be intercepted for logging by wireshark, whether wireshark is actually capturing or not?"?
– Alexander
Feb 28 at 17:29
No, it doesn't work like that at all.
– jksoegaard
Feb 28 at 17:40
No, it doesn't work like that at all.
– jksoegaard
Feb 28 at 17:40
1
1
Just open Terminal.app on any Mac and run the command: "man bpf"
– jksoegaard
Feb 28 at 19:39
Just open Terminal.app on any Mac and run the command: "man bpf"
– jksoegaard
Feb 28 at 19:39
|
show 1 more comment
Thanks for contributing an answer to Ask Different!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fapple.stackexchange.com%2fquestions%2f352593%2fwhy-am-i-able-to-open-wireshark-and-capture-packets-in-macos-without-root-privil%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
What kind of wireshark are you running? GUI (app) or command line?
– IconDaemon
Feb 27 at 12:40
Did you login as a standard user or as an administrator user?
– jksoegaard
Feb 27 at 12:40
The question in the title and the question in the body of your post aren't the same. The reason why you can open Wireshark without root privileges is because you can use it to analyze packet dumps, which are just ordinary files.
– Mark
Feb 27 at 20:53
@IconDaemon I am talking about GUI app.
– scipsycho
Feb 28 at 14:16