On Aug 1, 2023, at 7:57 PM, Zane C B-H <v.ve...@vvelox.net> wrote:
> 
> On 2023-08-01 18:44, Mark Saad wrote:
>>>> On Aug 1, 2023, at 4:39 PM, Zane C B-H <v.ve...@vvelox.net> wrote:
>>> So what is a good way to get all packets passing through that the kernel 
>>> currently sees? Apparently any is not support on non-Linux systems and 
>>> pflog would require adding log to all rules. Similarly only logs packets 
>>> that match a rule.
>> Just run tcpdump without the -i , iirc this will dump everything.
> 
> Nope. This just runs it on the first interface it finds.
> 
> - pflog - requires PF, requires adding it to all rules
> - ipfw tee - requires ipfw, not bad but it requires some one already be using 
> ipfw
> - deamonlogger - unmaintained... quiet literally dead upstream
> - suricata - can't tell it to for example not log packets for TCP port 443, 
> which for most FPC purposes just chew up disk space and all meaningful info 
> will be in the suricata TLS log
> 
> Now as to the question of firing up multiple instances of tcpdump, this means 
> that you will have duplicate packets where bridges are involved.

I haven’t tried it personally but maybe with Netgraph you can make a tap of all 
of this ?

What is your goal ?  


---
Mark Saad | nones...@longcount.org

Reply via email to