Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 01 May 1998 15:45:29 -0700
From:      "Gregory P. Smith" <greg@nas.nasa.gov>
To:        hackers@FreeBSD.ORG
Subject:   Ethernet address control
Message-ID:  <199805012245.PAA18558@ryouko.nas.nasa.gov>
In-Reply-To: Your message of "Fri, 01 May 1998 12:00:28 PDT." <199805011900.MAA01551@hub.freebsd.org> 

next in thread | previous in thread | raw e-mail | index | archive | help

> Besides sending out a broadcast ARP response, other possible usages
> of this thing include, for example, a slow and inefficient user-level
> Ethernet bridge with arbitrary firewall.
> 
> - -Serge

(yuck, I user level bridge!)

Anyways, more to the point and on a similar topic to the original
thread.  I added a little hack to NetBSD's BPF so that you can tell it
"the header is complete" when using it to send packets.  This prevents
it from re-writing the hosts's ethernet address into the packet before
going on the wire.  It was supposedly checked into NetBSDs CVS
repository yesterday by thorpej.

It adds an ioctl called BIOSHDRCMPLT (and BIOGHDRCMPLT) to set a flag
telling BPF to accept the header as it is.

I've been meaning to do it for FreeBSD as well but I don't have a lot
of time at the moment.  [The only box I needed it on was running
NetBSD].

Greg


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199805012245.PAA18558>