09-12-2002
you can also get iptables to log packets with certain aspects. Most people will use a sniffer like COLD, HUNT, ntop (and the ones mentioned above)
10 More Discussions You Might Find Interesting
1. IP Networking
I have 4 network ports on our T5240 sun server.
all but 1 gives packet losses (nxge1)
nxge0 gives on average 50% packet loss, very bad.
nxge2 gives on average 1-2% packet loss.
nxge3 gives on average 20% packet loss.
Is there a tool or something to help me find the problem? (11 Replies)
Discussion started by: photon
11 Replies
2. Programming
Hi,
i am using a linux CentOS machine. I have 2 real network interfaces
eth0, eth1 and 2 virtual interfaces tap0 and tap1. I am using PCAP library to capture
the packets on theses interfaces. If i specify the interface as "any",
i cannot find a way to know from which interface the packet... (1 Reply)
Discussion started by: rahulnitk2004
1 Replies
3. IP Networking
Hi All,
I need your help regarding packet capturing and modification. Like we may add extra content into the original html content.
Any open source tools.. programs...etc..
Do share your views and ideas.
-Vivek (1 Reply)
Discussion started by: viveksnv
1 Replies
4. Programming
Hi,
I want to write a packet sniffer in C without using libpcap. Can anyone suggest me how to begin writing it? Any tutorials or books?
Thanks in advance! (2 Replies)
Discussion started by: nefarious_genus
2 Replies
5. Programming
can anyone tell me how can i capture the packets. i have tried ethernet software to capture them but its not doing what i want it to do it (1 Reply)
Discussion started by: dazdseg
1 Replies
6. IP Networking
Hi, wondering if anyone can suggest a tool to me that will let me either cut & paste hex or type it in for packet decoding.
I want to be able to decode a packet as done with tcpdump or wireshark, but I want to be able to manually input the hex myself. (2 Replies)
Discussion started by: Breakology
2 Replies
7. Cybersecurity
Exercise:
Protection of WEB and DNS servers using the context-free rules for packet filtering:
- Protect your WEB-server, so that would be for him can be accessed by browsers, and could go to dns.
- Protect your primary DNS-server so that it could be to contact clients and secondary servers.... (1 Reply)
Discussion started by: numeracy
1 Replies
8. Homework & Coursework Questions
Exercise:
Protection of WEB and DNS servers using the context-free rules for packet filtering:
- Protect your WEB-server, so that would be for him can be accessed by browsers, and could go to dns.
- Protect your primary DNS-server so that it could be to contact clients and secondary servers.... (1 Reply)
Discussion started by: numeracy
1 Replies
9. AIX
(5 Replies)
Discussion started by: Vishal_dba
5 Replies
10. Solaris
I'd like to use SPARC Solaris10 to 'wake up' an old PC on same LAN.
what is the simplest way of doing it? (preferably without installing new software)
thanks. (14 Replies)
Discussion started by: orange47
14 Replies
LEARN ABOUT DEBIAN
ldns_pkt_edns_udp_size
ldns(3) Library Functions Manual ldns(3)
NAME
ldns_pkt_edns, ldns_pkt_edns_udp_size, ldns_pkt_edns_extended_rcode, ldns_pkt_edns_version, ldns_pkt_edns_z, ldns_pkt_edns_data,
ldns_pkt_set_edns_udp_size, ldns_pkt_set_edns_extended_rcode, ldns_pkt_set_edns_version, ldns_pkt_set_edns_z, ldns_pkt_set_edns_data-
SYNOPSIS
#include <stdint.h>
#include <stdbool.h>
#include <ldns/ldns.h>
bool ldns_pkt_edns(const ldns_pkt *packet);
uint16_t ldns_pkt_edns_udp_size(const ldns_pkt *packet);
uint8_t ldns_pkt_edns_extended_rcode(const ldns_pkt *packet);
uint8_t ldns_pkt_edns_version(const ldns_pkt *packet);
uint16_t ldns_pkt_edns_z(const ldns_pkt *packet);
ldns_rdf* ldns_pkt_edns_data(const ldns_pkt *packet);
void ldns_pkt_set_edns_udp_size(ldns_pkt *packet, uint16_t s);
void ldns_pkt_set_edns_extended_rcode(ldns_pkt *packet, uint8_t c);
void ldns_pkt_set_edns_version(ldns_pkt *packet, uint8_t v);
void ldns_pkt_set_edns_z(ldns_pkt *packet, uint16_t z);
void ldns_pkt_set_edns_data(ldns_pkt *packet, ldns_rdf *data);
DESCRIPTION
ldns_pkt_edns() returns true if this packet needs and EDNS rr to be sent. At the moment the only reason is an expected packet size larger
than 512 bytes, but for instance dnssec would be a good reason too.
packet: the packet to check
Returns true if packet needs edns rr
ldns_pkt_edns_udp_size() return the packet's edns udp size
packet: the packet
Returns the size
ldns_pkt_edns_extended_rcode() return the packet's edns extended rcode
packet: the packet
Returns the rcode
ldns_pkt_edns_version() return the packet's edns version
packet: the packet
Returns the version
ldns_pkt_edns_z() return the packet's edns z value
packet: the packet
Returns the z value
ldns_pkt_edns_data() return the packet's edns data
packet: the packet
Returns the data
ldns_pkt_set_edns_udp_size() Set the packet's edns udp size
packet: the packet
s: the size
ldns_pkt_set_edns_extended_rcode() Set the packet's edns extended rcode
packet: the packet
c: the code
ldns_pkt_set_edns_version() Set the packet's edns version
packet: the packet
v: the version
ldns_pkt_set_edns_z() Set the packet's edns z value
packet: the packet
z: the value
ldns_pkt_set_edns_data() Set the packet's edns data
packet: the packet
data: the data
AUTHOR
The ldns team at NLnet Labs. Which consists out of Jelte Jansen and Miek Gieben.
REPORTING BUGS
Please report bugs to ldns-team@nlnetlabs.nl or in our bugzilla at http://www.nlnetlabs.nl/bugs/index.html
COPYRIGHT
Copyright (c) 2004 - 2006 NLnet Labs.
Licensed under the BSD License. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
SEE ALSO
ldns_pkt. And perldoc Net::DNS, RFC1034, RFC1035, RFC4033, RFC4034 and RFC4035.
REMARKS
This manpage was automaticly generated from the ldns source code by use of Doxygen and some perl.
30 May 2006 ldns(3)