Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Jun 1997 18:23:35 -0600 (MDT)
From:      Wes Peters - Softweyr LLC <softweyr@xmission.com>
To:        kegray@cisco.com (Kenneth E. Gray)
Cc:        questions@freebsd.org
Subject:   Re: Kernel hacks to operate promiscuously?
Message-ID:  <199706280023.SAA10992@xmission.xmission.com>
In-Reply-To: <3.0.1.32.19970627091956.025849c0@lint.cisco.com> from "Kenneth E. Gray" at Jun 27, 97 09:19:56 am

next in thread | previous in thread | raw e-mail | index | archive | help
Ken Gray (of Cisco, no less) asks:
> I have an application that requires responding to all ip packets on an
> interface as if I were the true host (no, it's not a B&E tool).  Is there a
> known way to shift the BSD inetd into this mode (promiscuous)?  I don't
> necessarily want my application to respond as the destination address (I'll
> use my own address, thanks).

Sure, the Berkeley Packet Filter device does this.  You may want to
look at bpf itself, and at tcpdump, which uses bpf to packet-trace a
network interface.

-- 
          "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                       Softweyr LLC
http://www.xmission.com/~softweyr                       softweyr@xmission.com



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199706280023.SAA10992>