Thanks! That all make sense.
Wei
- Original Message
From: Gleb Smirnoff <[EMAIL PROTECTED]>
To: Weiguang Shi <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]; freebsd-net@FreeBSD.org
Sent: Saturday, September 1, 2007 1:51:38 AM
Subject: Re: questions wrt ng_netflow
Weiguang,
From: Bruce M. Simpson <[EMAIL PROTECTED]>
To: Weiguang Shi <[EMAIL PROTECTED]>
Cc: freebsd-net@freebsd.org
Sent: Tuesday, August 28, 2007 12:15:34 AM
Subject: Re: nc captures 1024 bytes
Looks like a netcat bug, if it doesn't tune buffers to the interface MTU.
I'm no
en = jflag ? 8192 : 1024;
639
- Original Message ----
From: Weiguang Shi <[EMAIL PROTECTED]>
To: freebsd-net@freebsd.org
Sent: Monday, August 27, 2007 4:05:26 PM
Subject: nc captures 1024 bytes
Hi,
My system is FreeBSD 6.2. I sent a UDP datagram of 1464 bytes to port
1234 wher
Hi,
My system is FreeBSD 6.2. I sent a UDP datagram of 1464 bytes to port
1234 where nc was waiting
% nc -n -u -l 1234 >tt
Afterwards, the size of tt, however, was only 1024 bytes.
I noticed this piece of code in nc
341 if (uflag) {
342
Hi there,
I've been reading netlfow.c in FreeBSD-6.2 and this piece of code confuses me.
484 /*
485 * Go through hash and find our entry. If we encounter an
486 * entry, that should be expired, purge it. We do a reverse
487 * sear
moat.nlanr.org has a huge collection of traces, with dst and src IP addresses
anonymized.
Wei
- Original Message
From: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Sent: Sunday, August 19, 2007 8:47:28 PM
Subject: Canonical Packet Traces?
Howdy,
A very slightly off to