From owner-freebsd-hackers Fri May 1 15:45:49 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA07765 for freebsd-hackers-outgoing; Fri, 1 May 1998 15:45:49 -0700 (PDT) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from ryouko.nas.nasa.gov (ryouko.nas.nasa.gov [129.99.34.103]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA07759 for ; Fri, 1 May 1998 15:45:41 -0700 (PDT) (envelope-from greg@ryouko.nas.nasa.gov) Received: from ryouko.nas.nasa.gov (localhost [127.0.0.1]) by ryouko.nas.nasa.gov (8.8.7/NAS8.8.7) with ESMTP id PAA18558 for ; Fri, 1 May 1998 15:45:29 -0700 (PDT) Message-Id: <199805012245.PAA18558@ryouko.nas.nasa.gov> To: hackers@FreeBSD.ORG Subject: Ethernet address control In-reply-to: Your message of "Fri, 01 May 1998 12:00:28 PDT." <199805011900.MAA01551@hub.freebsd.org> Date: Fri, 01 May 1998 15:45:29 -0700 From: "Gregory P. Smith" Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > Besides sending out a broadcast ARP response, other possible usages > of this thing include, for example, a slow and inefficient user-level > Ethernet bridge with arbitrary firewall. > > - -Serge (yuck, I user level bridge!) Anyways, more to the point and on a similar topic to the original thread. I added a little hack to NetBSD's BPF so that you can tell it "the header is complete" when using it to send packets. This prevents it from re-writing the hosts's ethernet address into the packet before going on the wire. It was supposedly checked into NetBSDs CVS repository yesterday by thorpej. It adds an ioctl called BIOSHDRCMPLT (and BIOGHDRCMPLT) to set a flag telling BPF to accept the header as it is. I've been meaning to do it for FreeBSD as well but I don't have a lot of time at the moment. [The only box I needed it on was running NetBSD]. Greg To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message