Date: Fri, 27 Jun 1997 18:23:35 -0600 (MDT) From: Wes Peters - Softweyr LLC <softweyr@xmission.com> To: kegray@cisco.com (Kenneth E. Gray) Cc: questions@freebsd.org Subject: Re: Kernel hacks to operate promiscuously? Message-ID: <199706280023.SAA10992@xmission.xmission.com> In-Reply-To: <3.0.1.32.19970627091956.025849c0@lint.cisco.com> from "Kenneth E. Gray" at Jun 27, 97 09:19:56 am
next in thread | previous in thread | raw e-mail | index | archive | help
Ken Gray (of Cisco, no less) asks: > I have an application that requires responding to all ip packets on an > interface as if I were the true host (no, it's not a B&E tool). Is there a > known way to shift the BSD inetd into this mode (promiscuous)? I don't > necessarily want my application to respond as the destination address (I'll > use my own address, thanks). Sure, the Berkeley Packet Filter device does this. You may want to look at bpf itself, and at tcpdump, which uses bpf to packet-trace a network interface. -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC http://www.xmission.com/~softweyr softweyr@xmission.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199706280023.SAA10992>