From owner-freebsd-hackers Thu Feb 3 13:29: 8 2000 Delivered-To: freebsd-hackers@freebsd.org Received: from security.za.net (security.za.net [209.212.100.194]) by builder.freebsd.org (Postfix) with ESMTP id 12B44403C for ; Thu, 3 Feb 2000 13:29:04 -0800 (PST) Received: from localhost (lists@localhost) by security.za.net (8.9.3/8.9.3) with ESMTP id XAA03541 for ; Thu, 3 Feb 2000 23:29:04 +0200 (SAST) (envelope-from lists@security.za.net) Date: Thu, 3 Feb 2000 23:28:49 +0200 (SAST) From: To: hackers@freebsd.org Subject: IPFW / IP Filter question Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG A quick question, is it possible to copy all traffic coming into a particular interface to a divert socket, while still having the traffic also running normally and taking normal routes etc. I would have thought you would use the tee option in ipfw for this, but its not implemented yet according to my man pages, so I was wondering if there was another way to do this, cause it makes traffic analysis a hell of a lot easier if I can do this rather than having to sniff it with bpf or something. Any help would be appreciated Andrew To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message