From owner-freebsd-questions Fri Jun 27 17:23:44 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id RAA24065 for questions-outgoing; Fri, 27 Jun 1997 17:23:44 -0700 (PDT) Received: from xmission.xmission.com (softweyr@xmission.xmission.com [198.60.22.2]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id RAA24060 for ; Fri, 27 Jun 1997 17:23:41 -0700 (PDT) Received: (from softweyr@localhost) by xmission.xmission.com (8.8.5/8.7.5) id SAA10992; Fri, 27 Jun 1997 18:23:36 -0600 (MDT) From: Wes Peters - Softweyr LLC Message-Id: <199706280023.SAA10992@xmission.xmission.com> Subject: Re: Kernel hacks to operate promiscuously? To: kegray@cisco.com (Kenneth E. Gray) Date: Fri, 27 Jun 1997 18:23:35 -0600 (MDT) Cc: questions@freebsd.org In-Reply-To: <3.0.1.32.19970627091956.025849c0@lint.cisco.com> from "Kenneth E. Gray" at Jun 27, 97 09:19:56 am X-Mailer: ELM [version 2.4 PL25] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-questions@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Ken Gray (of Cisco, no less) asks: > I have an application that requires responding to all ip packets on an > interface as if I were the true host (no, it's not a B&E tool). Is there a > known way to shift the BSD inetd into this mode (promiscuous)? I don't > necessarily want my application to respond as the destination address (I'll > use my own address, thanks). Sure, the Berkeley Packet Filter device does this. You may want to look at bpf itself, and at tcpdump, which uses bpf to packet-trace a network interface. -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC http://www.xmission.com/~softweyr softweyr@xmission.com