From owner-freebsd-security Tue Feb 2 13:44:47 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA08649 for freebsd-security-outgoing; Tue, 2 Feb 1999 13:44:47 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from isr3277.urh.uiuc.edu (isr3277.urh.uiuc.edu [130.126.65.13]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id NAA08640 for ; Tue, 2 Feb 1999 13:44:46 -0800 (PST) (envelope-from ftobin@bigfoot.com) Received: (qmail 6437 invoked by uid 1000); 2 Feb 1999 21:44:41 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 2 Feb 1999 21:44:41 -0000 Date: Tue, 2 Feb 1999 15:44:25 -0600 (CST) From: Frank Tobin X-Sender: ftobin@isr3277.urh.uiuc.edu To: Bill Woodford cc: ML FreeBSD Security Subject: Re: tcpdump In-Reply-To: <19990202153458.A1152@cc181716-a.hwrd1.md.home.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tue, 2 Feb 1999, Bill Woodford wrote: > tcpdump: /dev/bpf0: Device not configured You need the Berkeley packet filter device set in your kernel. pseudo-device bpfilter 4 #Berkeley packet filter (from LINT) Be aware that if you install this device, and root is compromised on your machine, one may use a sniffing program to monitor traffic. - -- Frank Tobin "To learn what is good and what is to be http://www.bigfoot.com/~ftobin valued, those truths which cannot be shaken or changed." Myst: The Book of Atrus FreeBSD: The Power To Serve If you use Pine and PGP 5.0(i), try pgpenvelope. http://www.bigfoot.com/~ftobin/resources.html -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQA/AwUBNrdjtwL4UDr0DrZeEQLpjgCfRq5mjhyMp6EQY0XpL+VPUU2iqU8AoPwT SxdbNhtszTYgIGRKbWp12n90 =rb2u -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message