Peter Pearson <pkpearson@nowhere.invalid>:

> Cobbling together a minimalist ethernet-sniffing program, I was hoping
> to use this simple mechanism for setting the socket to "promiscuous
> mode" (to see all traffic going past, instead of just traffic
> addressed to my machine):
>
>     s.ioctl(socket.SIO_RCVALL, socket.RCVALL_ON)
>
> Unfortunately, it seems that that mechanism is available under Windows
> but not under Linux.

Can't remember having done that for years, if ever. However, one place
to give you pointers is running:

     strace tcpdump

as root. It reveals all the system calls involved.


Marko
-- 
https://mail.python.org/mailman/listinfo/python-list

Reply via email to