Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Nov 2017 16:38:10 -0700
From:      Kevin Oberman <rkoberman@gmail.com>
To:        DES <3des@inx.su>
Cc:        "freebsd-net@freebsd.org" <freebsd-net@freebsd.org>
Subject:   Re: IP packet header visualization software
Message-ID:  <CAN6yY1tT41u0pGK-6-YSU6f0gh-KiEAeY_P53CiP7JoL%2BXdsyg@mail.gmail.com>
In-Reply-To: <6de334e9-8962-e43d-006d-8bc2fe4ec1ea@inx.su>
References:  <6de334e9-8962-e43d-006d-8bc2fe4ec1ea@inx.su>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Nov 1, 2017 at 2:46 PM, DES <3des@inx.su> wrote:

> Hello FreeBSD-Net,
>
> does anybody remember, around year 2004, there was a software application
> available (either as port, or package). Unfortunately I do not recall the
> application name and I'm not able to find it again, although I've reviewed
> the Ports collection from year 2005 which I have on 3 DVDs. I do not
> remember if the application captured data from the network interface by
> itself, or used tcpdump output, that actually doesn't matter. What matters
> is that this app draw a picture of the selected IP packet's header, similar
> to the one in RFC791 at page 11, chapter "3.1. Internet Header Format". The
> picture drawn was minimalistic and in colors (green, yellow), and it showed
> the field values from the actual capture. I've ran it under TWM, and it
> looked close to that one, but showing captured values instead of (or along
> with) field names -
>
> Appreciate if anybody remembers that application by a chance and could
> tell its name.
>
> thank you
>
> 3des
>

tcptrace? I have not used it since I retired, but I think it was similar to
what you are looking for. Its output is just text. It used an external tool
to implement the plots, xplot. xplot died back on gcc-3.3 and I have no
idea what its current status is, but I fear it's abandoned, xpolt.org still
is alive, though.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAN6yY1tT41u0pGK-6-YSU6f0gh-KiEAeY_P53CiP7JoL%2BXdsyg>