Date: Sun, 9 Jul 2000 16:04:53 -0700 From: "Michael S. Fischer" <michael@dynamine.net> To: <freebsd-net@freebsd.org> Subject: bpf problem with lo0 interface Message-ID: <NEBBLEIKJJGDCCJMPEJOEECKCAAA.michael@dynamine.net>
next in thread | raw e-mail | index | archive | help
Hi there, Running 4.0-STABLE, I seem to be having difficulty getting any of the packet capture/analysis tools (with the exception of tcpdump, which prints the headers correctly) to give me packet _data_ information when I sniff the lo0 interface. Tools I've tested: - tcpshow(1) - tcpflow(1) Here's an example: # tcpdump -s 1518 -i lo0 -lenx port 143 | tcpshow -cooked -noEtherNames tcpdump: listening on lo0 --------------------------------------------------------------------------- Packet 1 TIME: 16:03:25.186986 LINK: 64:14:25:21:.1:84 -> 0>::å¿:æ#:(L:( type=64.14.25.210.143: <*** No decode support for encapsulated protocol ***> --------------------------------------------------------------------------- Packet 2 TIME: 16:03:25.187048 (0.000062) LINK: 64:14:25:21:.1:03 -> 0>:(::å::$:((:( type=64.14.25.210.1284: <*** No decode support for encapsulated protocol ***> ... and tcpflow shows, well, nothing at all. I am able to successfully sniff/analyze captured data using the two tools above when using the fxp0 interface. Can someone please assist? Thanks, -- Michael S. Fischer <michael@dynamine.net> AKA Otterley _O_ Lead Hacketeer, Dynamine Consulting, Silicon Valley, CA | Phone: +1 650 533 4684 | AIM: IsThisOtterley | ICQ: 4218323 | "From the bricks of shame is built the hope"--Alan Wilder net.goth To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?NEBBLEIKJJGDCCJMPEJOEECKCAAA.michael>