Hi,
On 1/31/06, jamal <[EMAIL PROTECTED]> wrote:
> On Tue, 2006-31-01 at 16:26 +0100, Harald Welte wrote:
> > On Tue, Jan 24, 2006 at 09:19:02PM +0100, Mathieu Geli wrote:
> >
> > > Here is a patch that add a netlink virtual interface.
> >
> > I reall
On Tue, 2006-31-01 at 16:26 +0100, Harald Welte wrote:
> On Tue, Jan 24, 2006 at 09:19:02PM +0100, Mathieu Geli wrote:
>
> > Here is a patch that add a netlink virtual interface.
>
> I really like the possibility that it offers. In fact, I always wanted
> something like a
Harald Welte wrote:
> On Tue, Jan 24, 2006 at 09:19:02PM +0100, Mathieu Geli wrote:
>
>
>>Here is a patch that add a netlink virtual interface.
>
>
> I really like the possibility that it offers. In fact, I always wanted
> something like a 'promiscuous netl
On Tue, Jan 24, 2006 at 09:19:02PM +0100, Mathieu Geli wrote:
> Here is a patch that add a netlink virtual interface.
I really like the possibility that it offers. In fact, I always wanted
something like a 'promiscuous netlink socket'.
Whether it is the right thing to add
> Do you think, that such approach may be extended to unix-domain
> traffic as well, or there are other ways to sniff such packets?
I don't know if similar things exists or have existed for UNIX sockets.
That could be useful having an infrastructure that'll enable to redirect certain
socket type t
Hi Mathieu,
> Here is a patch that add a netlink virtual interface.
> Through a hook in af_netlink.c every packets are duplicated and sent to
> that interface. Thus userspace sniffers can capture them.
Looks like an interesting direction.
Do you think, that such approach may be extende
Hi,
Here is a patch that add a netlink virtual interface.
Through a hook in af_netlink.c every packets are duplicated and sent to
that interface. Thus userspace sniffers can capture them.
Dissectors are being developed for scapy [1] at the moment.
I'll be glad to hear about how to fix the c