Hi Henko, the proper solution to this problem ist to use on libpcap's python bindings, like for example Billy The Kid.
Here are some pointers: http://home.student.utwente.nl/g.v.berg/btk/ http://pycap.sourceforge.net/ http://monkey.org/~dugsong/pypcap/ http://www.tcpdump.org/ (libpcap) HTH Gerald ----- Original Message ----- From: Henko Gouws (H) To: python-list@python.org Sent: Tuesday, October 25, 2005 10:26 AM Subject: Listen in promiscuous mode (Sniffer) on UDP port 162 and copy packetsto another port Dear reader An application A opens UDP port 162 and listens for incoming packets. We have another application B that wants to receive the same information from UDP port 162 but this application cannot open the port 162 because it is already opened by application A. We want both A and B to receive information from port 162. Does anyone know how to implement such a solution using Python or give relevant advice? Alternatively does anyone know about any postings that involved Ethernet sniffers or Python programs listening to network traffic in promiscuous mode? Thank you regards Henko Gouws (Pr. Eng.) Senior Engineer: Technical Product Development Telkom Development Lab Tel: +27 12 529 7385 Fax: +27 12 548 0065 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This e-mail and its contents are subject to the Telkom SA Limited e-mail legal notice available at http://www.telkom.co.za/TelkomEMailLegalNotice.PDF ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -- http://mail.python.org/mailman/listinfo/python-list -- http://mail.python.org/mailman/listinfo/python-list