soko.tica Wrote:
Hello, list
When I tried to see pf log of my recently installed OpenBSD 4.4
desktop box, I've got the message that snaplen has been raised from 96
to 116, even when I did give it a try with -s 96.
That is normal. The snaplen is only used for listening on an interface.
When reading a capture file, tcpdump uses the snaplen recorded in the
file, regardless of the snaplen setting.
116 is what pflogd(8) uses for recording pflog traffic. Since pflog
interface headers are bigger than ethernet headers, 116 is the minimum
you can use that can reliably capture all pflog interface headers plus
IP and TCP/UDP headers.
$ sudo tcpdump -n -e -ttt -r /var/log/pflog -s 96
Password:
tcpdump: WARNING: snaplen raised from 96 to 116
Any thoughts how to reduce it to examine the logs? Aside, could that
be a symptom of a break-in?
You can not, and even if you did, you would be truncating TCP/UDP
headers so the information you see would be incomplete. Where did 96
come from anyway? Some obscure policy written for ethernet interfaces?
Now, if somebody broke into your system, they would want to disable
logging, or reduce the amount logged, not increase it.
Can