From owner-freebsd-questions Sun Nov 26 14:18:38 1995 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id OAA06336 for questions-outgoing; Sun, 26 Nov 1995 14:18:38 -0800 Received: from kryten.atinc.com (kryten.Atinc.COM [198.138.38.7]) by freefall.freebsd.org (8.6.12/8.6.6) with ESMTP id OAA06323 for ; Sun, 26 Nov 1995 14:18:30 -0800 Received: (jmb@localhost) by kryten.atinc.com (8.6.9/8.3) id RAA26986; Sun, 26 Nov 1995 17:05:52 -0500 Date: Sun, 26 Nov 1995 17:05:50 -0500 (EST) From: "Jonathan M. Bresler" Subject: Re: tcpdump bpf0 permissions To: Everett F Batey cc: questions@freebsd.org In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-questions@freebsd.org Precedence: bulk On Sun, 26 Nov 1995, Everett F Batey wrote: > > Cant access tcpdump as suer or as root .. seems to be looking for a > SUnOSish like command like the setup to in.etherd pre Solaris to open > the interface to permiscuous (sp?) mode .. > > tcpdump: /dev/bpf0: Device not configured you need to compile a kernel that contains the bpf psuedo-devices. add the line "pseudo-device bpfilter 4 #Berkeley packet filter" to the end of your kernel config file and rebuild the kernel. install the new kernel and reboot. at boot time you want to see lines similar to "bpf: ep0 attached". you can also use /sbin/dmesg to view the boot messages. you will need one bpfilter for each interface that you want to use tcpdump on Jonathan M. Bresler FreeBSD Postmaster jmb@FreeBSD.ORG play go. ride bike. hack FreeBSD.--ah the good life i am moving to a new job. PLEASE USE: jmb@FreeBSD.ORG