From owner-freebsd-net Sun Oct 10 17:28:28 1999 Delivered-To: freebsd-net@freebsd.org Received: from bubba.whistle.com (bubba.whistle.com [207.76.205.7]) by hub.freebsd.org (Postfix) with ESMTP id 2496D14EDD for ; Sun, 10 Oct 1999 17:28:27 -0700 (PDT) (envelope-from archie@whistle.com) Received: (from archie@localhost) by bubba.whistle.com (8.9.2/8.9.2) id RAA11266; Sun, 10 Oct 1999 17:28:21 -0700 (PDT) From: Archie Cobbs Message-Id: <199910110028.RAA11266@bubba.whistle.com> Subject: Re: Divert Sockets In-Reply-To: <99100810404704.04076@nv12.netvision.com.br> from Andre Luiz dos Santos at "Oct 8, 1999 10:35:06 am" To: andre@netvision.com.br (Andre Luiz dos Santos) Date: Sun, 10 Oct 1999 17:28:21 -0700 (PDT) Cc: freebsd-net@FreeBSD.ORG X-Mailer: ELM [version 2.4ME+ PL54 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-net@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Andre Luiz dos Santos writes: > Is there anyway to me know the source MAC address of a packet divert'ed to a > divert socket? Like in BPF, where you've the headers of the ethernet packet. No. Divert works at the IP layer is not specific to Ethernet, and so doesn't provide any way to get the Ethernet header.. it's already long gone by the time divert sees it anyway. > If this is not possible, there are anyway to me block an IP packet by their > MAC address? Not without a custom kernel hack AFAIK. -Archie ___________________________________________________________________________ Archie Cobbs * Whistle Communications, Inc. * http://www.whistle.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message