-$Id$
-
-Installing Wireshark on FreeBSD/OpenBSD/NetBSD
+Installing Wireshark on FreeBSD/OpenBSD/NetBSD/DragonFly BSD
========================================================================
1. Extra packages required
- 2. Compiling Wireshark
+ 2. Compiling Wireshark
3. Berkeley Packet Filter (BPF) requirement
4. Running Wireshark as a non-root user
Wireshark requires a number of additional programs to function.
Install the latest versions of the following programs before compiling:
- atk
- cairo
- expat
- gettext
- glib2
- glitz
- gtk2 / gtk+2
- jpeg
- libiconv
- pango
- pkgconfig
- png
- tiff
-
The easiest way to install these is by using your operating system's
-ports or packages system.
+ports or packages system. If you prefer to build from source, the programs
+can be found at the following sites:
+
+ glib 2.32 or later:
+ ftp.gnome.org:/pub/gnome/sources/glib/
+ http://ftp.gnome.org/pub/gnome/sources/glib/
+
+ pkgconfig:
+ http://pkgconfig.freedesktop.org/releases/
+
+ python 3.4 or later:
+ https://www.python.org/downloads/source/
+
+If you want to use the Wireshark GUI, install one or both of these toolkits:
+
+ Qt 5.2 or later:
+ http://download.qt-project.org/official_releases/qt/
+
+
+(These programs may require additional dependencies)
+
+Additional programs can be used to enhance Wireshark's functionality.
+These can be found by typing ./configure --help or looking at the output
+at the end of running the configure script.
2. Compiling Wireshark
-----------------------
To compile Wireshark with the default options, run configure, make and
-make install:
+make install (you may have to run "autogen.sh" first):
./configure
make
system's documentation on how to make permanent these changes as they
are often reset upon reboot; if /dev is implemented with devfs, it might
be possible to configure devfs to create all bpf devices owned by a
-particular user and/or group and with particular permissions.
+particular user and/or group and with particular permissions. In
+FreeBSD 6.0 and later this can be done by creating an /etc/devfs.rules
+file with content such as
+
+ [localrules=10]
+ add path 'bpf*' {mode and permissions}
+
+where "mode and permissions" can include clauses such as
+
+ mode {octal permissions}
+
+to set the permissions on the device (e.g., "mode 0660" to set the
+permissions to rw-rw-r--),
+
+ user {user}
+
+to set the user who owns the device, or
+
+ group {group}
+
+to set the group that owns the device and adding a line such as
+
+ devfs_system_ruleset=localrules
+
+to /etc/rc.conf. For example, an /etc/devfs.rules file with
+
+ [localrules=10]
+ add path 'bpf*' mode 0660 group wheel
+
+will grant read and write permissions on all BPF devices to all users in
+the "wheel" group.