Date: Fri, 01 May 1998 15:45:29 -0700 From: "Gregory P. Smith" <greg@nas.nasa.gov> To: hackers@FreeBSD.ORG Subject: Ethernet address control Message-ID: <199805012245.PAA18558@ryouko.nas.nasa.gov> In-Reply-To: Your message of "Fri, 01 May 1998 12:00:28 PDT." <199805011900.MAA01551@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> Besides sending out a broadcast ARP response, other possible usages > of this thing include, for example, a slow and inefficient user-level > Ethernet bridge with arbitrary firewall. > > - -Serge (yuck, I user level bridge!) Anyways, more to the point and on a similar topic to the original thread. I added a little hack to NetBSD's BPF so that you can tell it "the header is complete" when using it to send packets. This prevents it from re-writing the hosts's ethernet address into the packet before going on the wire. It was supposedly checked into NetBSDs CVS repository yesterday by thorpej. It adds an ioctl called BIOSHDRCMPLT (and BIOGHDRCMPLT) to set a flag telling BPF to accept the header as it is. I've been meaning to do it for FreeBSD as well but I don't have a lot of time at the moment. [The only box I needed it on was running NetBSD]. Greg To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199805012245.PAA18558>