Sponsored Content
Special Forums IP Networking how to hack linux driver to delay incoming packets Post 302503329 by sameer kulkarni on Thursday 10th of March 2011 08:08:21 AM
Old 03-10-2011
is it possible by the above method
in case
1. when the packets come from say system A and its destination is C.
2.before forwarding it to C from the current system i need to introdude the delay
3. and i want it run like a demon process delaying every packet...
 

9 More Discussions You Might Find Interesting

1. Red Hat

How to check the outbound packets in Linux

I have a linux redhat box , our security department in my company informed me that my server's IP sends So many traffic in my network , This box I am using it as FTP server to store the other servers logs . My question briefly is how to check my outbound packets which are going from my PC to the... (1 Reply)
Discussion started by: DarkSoul
1 Replies

2. Cybersecurity

~ IPTables : Limit Incoming UDP Packets With a Certain Length ~

Hello, I am currently trying to limit incoming UDP length 20 packets on a per IP basis to 5 a second using IPTables on a Linux machine (CentOS 5.2). Basically, if an IP is sending more than 5 length 20 UDP packet a second to the local machine, I would like the machine to drop the excess... (1 Reply)
Discussion started by: tomboy123
1 Replies

3. UNIX for Dummies Questions & Answers

Linux box drops the incoming packets

Hi all, I am new to Linux kernel. we have a c file that counts the no. of sends and received packets in each interface, and indicate the user about the error/drop ration of incoming and outgoing packets. in our Linux box , the incoming packets are dropped at random interval. we have our... (1 Reply)
Discussion started by: kannandv
1 Replies

4. IP Networking

how to delay the outgoing packets ??

hello, i am searching a way to delay the incoming packets before it goes out of the system may i know how can i approach to this problem? (3 Replies)
Discussion started by: sameer kulkarni
3 Replies

5. Linux

how to allow incoming UDP packets with iptables

I am looking for an iptables command to allow incoming UDP packets for my Linux server also is there a command I can use to set the default action for outgoing packets to accept? Thank you (1 Reply)
Discussion started by: crimputt
1 Replies

6. Cybersecurity

How can someone hack into a Linux server ?

Hi! I have a debian linux VPS and i am wondering how would someone be able to hack into it , in what ways ? I've asked a more knowledgeable friend and he said the only way someone would be able to get into my VPS is via FTP or SSH, are there some other ways someone can enter my machine ? I... (18 Replies)
Discussion started by: ParanoiaUser
18 Replies

7. IP Networking

How to route all incoming packets from one virtual interface?

Hello, I'm trying to route all packets arriving at a particular interface by entering the same interface the virtual interface eth1: 2 and now everything is routed by default gw configured on eth1. eth1 Link encap:Ethernet HWaddr 0a:0e:64:18:52:72 inet addr:192.168.10.15 eth1:2 ... (1 Reply)
Discussion started by: faka
1 Replies

8. Red Hat

Hack a centos Linux box

HI, I have a Centos linux box and there is interface connect to internet. I stop the iptables in this box . After a few day , I find the linux box have been hacked and install some perl script into the box . Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies

9. IP Networking

How to route packets back to incoming interface?

Hi folks, I have a debian server running an Apache daemon on the eth0 interface. Now from time to time the server has to open an openvpn connection (tun0) to other networks to get some data from there. During this period the Apache is no longer reachable under it's IP address on eth0 because all... (6 Replies)
Discussion started by: flyingwalrus
6 Replies
CLNP(4) 						   BSD Kernel Interfaces Manual 						   CLNP(4)

NAME
clnp -- Connectionless-Mode Network Protocol SYNOPSIS
#include <sys/socket.h> #include <netiso/iso.h> #include <netiso/clnp.h> int socket(AF_ISO, SOCK_RAW, 0); DESCRIPTION
CLNP is the connectionless-mode network protocol used by the connectionless-mode network service. This protocol is specified in ISO 8473. It may be accessed through a ``raw socket'' for debugging purposes only. CLNP sockets are connectionless, and are normally used with the sendto(2) and recvfrom(2) system calls, though the connect(2) call may also be used to fix the destination for future packets (in which case the read(2) or recv(2) and write(2) or send(2) system calls may be used). Outgoing packets automatically have a CLNP header prepended to them. Incoming packets received by the user contain the full CLNP header. The following setsockopt(2) options apply to CLNP: CLNPOPT_FLAGS Sets the flags which are passed to clnp when sending a datagram. Valid flags are: CLNP_NO_SEG Do not allow segmentation CLNP_NO_ER Suppress ER pdus CLNP_NO_CKSUM Do not generate the CLNP checksum CLNPOPT_OPTS Sets CLNP options. The options must be formatted exactly as specified by ISO 8473, section 7.5 ``Options Part''. Once an option has been set, it will be sent on all packets until a different option is set. CONGESTION EXPERIENCE BIT
Whenever a packet is transmitted, the globally unique quality of service option is added to the packet. The sequencing preferred bit and the low transit delay bit are set in this option. If a packet is forwarded containing the globally unique quality of service option, and the interface through which the packet will be trans- mitted has a queue length greater than congest_threshold, then the congestion experienced bit is set in the quality of service option. The threshold value stored in congest_threshold may be tuned. When a packet is received with the globally unique quality of service option present, and the congestion experienced bit is set, then the transport congestion control function is called. DIAGNOSTICS
A socket operation may fail with one of the following errors returned: [EISCONN] When trying to establish a connection on a socket which already has one, or when trying to send a datagram with the destina- tion address specified and the socket is already connected; [ENOTCONN] When trying to send a datagram, but no destination address is specified, and the socket hasn't been connected; [ENOBUFS] When the system runs out of memory for an internal data structure; [EADDRNOTAVAIL] When an attempt is made to create a socket with a network address for which no network interface exists; [EHOSTUNREACH] When trying to send a datagram, but no route to the destination address exists. [EINVAL] When specifying unsupported options. SEE ALSO
recv(2), send(2), intro(4), iso(4) BUGS
Packets are sent with the type code of 0x1d (technically an invalid packet type) for lack of a better way to identify raw CLNP packets. No more than MLEN bytes of options can be specified. BSD
April 2, 1994 BSD
All times are GMT -4. The time now is 02:45 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy