docs/102719: [patch] ng_bpf(4) example leads to unneeded promiscuos mode activation

Eugene Grosbein eugen at grosbein.pp.ru
Thu Aug 31 06:10:19 UTC 2006


>Number:         102719
>Category:       docs
>Synopsis:       [patch] ng_bpf(4) example leads to unneeded promiscuos mode activation
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-doc
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Aug 31 06:10:12 GMT 2006
>Closed-Date:
>Last-Modified:
>Originator:     Eugene Grosbein
>Release:        FreeBSD 6.1-STABLE i386
>Organization:
Svyaz Service JSC
>Environment:
System: FreeBSD nkz.delikates-nk.ru 6.1-STABLE FreeBSD 6.1-STABLE #0: Wed Aug 16 20:09:18 KRAST 2006 sa at nkz.delikates-nk.ru:/home/obj/home/src/sys/NKZ i386

>Description:
	ng_bpf(4) teaches to use tcpdump(1) to generate raw BPF
        instructions. However, the exact command line does not
	include	'-p' option. This may activate promiscous mode on
	first ethernet interface, if any. This is not needed and
	should not happen.

>How-To-Repeat:
	Use example from bg_bpf(4) manual page and see pair of
	'promiscuous mode enabled/promiscuous mode disabled' messages
	in the kernel log.

>Fix:

--- src/share/man/man4/ng_bpf.4.orig	Sat Feb  5 18:31:31 2005
+++ src/share/man/man4/ng_bpf.4	Thu Aug 31 13:49:15 2006
@@ -170,7 +170,7 @@
 }
 xxENDxx
 
-BPFPROG=`tcpdump -s 8192 -ddd ${PATTERN} | awk -f /tmp/bpf.awk`
+BPFPROG=`tcpdump -s 8192 -i lo0 -p -ddd ${PATTERN} | awk -f /tmp/bpf.awk`
 
 ngctl msg ${NODEPATH} setprogram { thisHook=\\"${INHOOK}\\" \\
   ifMatch=\\"${MATCHHOOK}\\" \\


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-doc mailing list