10 More Discussions You Might Find Interesting
1. Cybersecurity
Hello,
on a PC with Debian 8 I try to use a Bash script with Netfilter rules so that only traffic goes in and out that is wanted. For that I set all 3 default policies to "drop". The machine uses DHCP to get its IP, gateway and DNS. And I never checked so I was quite surprised that my... (1 Reply)
Discussion started by: SInt
1 Replies
2. Cybersecurity
Hi all,
I would like to get some ideas and opinions on matter of libvirt netfilter application in KVM environment. I am looking for some easy way to control it with an API and possible experience with that and its performance in real life application.
Thanks for all ideas (0 Replies)
Discussion started by: smoofy
0 Replies
3. Linux
Hello,
Everyone knows that with PF_PACKET sockets one can "sniff" a determinated frame from the network device, but just that, see the frame without altering its action on the receiving host. What i want is to "intercept" the incoming frame and pass it through some rules, and if it doesn't pass... (9 Replies)
Discussion started by: Zykl0n-B
9 Replies
4. IP Networking
Hello,
I have switch port, that allows only a single MAC/IP connected to it. - But, I would like to connect two hosts, without any additional private network. (No NAT.)
Therefore the plan is adding a linux router doing proxy-arp with three interfaces, one for host1, one for host2 and one... (2 Replies)
Discussion started by: michas
2 Replies
5. Solaris
Hi everyone,
I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies
6. Linux
HI,
Is the Netfilter and IPtables same?
Thanks & Regards
Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies
7. Cybersecurity
Hi everyone, I would like to allow multi users to access P2P networks, so I wonder if there's a way to tracking these kind of protocols with netfilter, and also compatibility with nat, like the module conntrack_ftp seems to do with the FTP protocol.
Thanks guys. (0 Replies)
Discussion started by: nekkro-kvlt
0 Replies
8. Programming
Hello friends i'm trying to extend iptables to include a target by which we can change the packet type field of a packet.
For this i created a kernel module and a userspace extension.
Now i face the problem that when i try to invoke iptable with the target i created i get an error message saying... (1 Reply)
Discussion started by: Rakesh Ranjan
1 Replies
9. Programming
Friends I'm facing a big problem trying to extend the netfilter. Somone please help me with your quick reply (any hint) as I've to meet a deadline.
My problem is that I've written a new netfilter target module and its corresponding userspace program for iptables to change the packet type of a... (0 Replies)
Discussion started by: Rakesh Ranjan
0 Replies
10. Programming
Hi everybody,
I have to write a module for matching in netfilter , extending the netfilter but I'm facing some problems can somebody guide me in that. I know that I need to write matching module working in kernel space and a program in userspace. I went through the HOWTO on netfilter-hacking but... (0 Replies)
Discussion started by: Trusted Penguin
0 Replies
trace(5) File Formats Manual trace(5)
Name
trace - system call tracer device
Description
The file is the system call trace device. It supports the following system calls: and The device supports 16 (configurable in as TR_USRS)
simultaneous users. It uses an 8192-byte buffer for trace records. The choice of which system calls to trace is done with the system call.
The call is used for efficient reading of the device. The call uses an 8192-byte buffer and returns when the buffer is 60% full. It is
required that the user use a buffer the same size as the system buffer size defined in as TR_BUFSIZE. All operations are defined in the
header file, The calls are:
--------------------------------
ioctl arg (pointer to)
--------------------------------
IOTR_GETOFF int a
IOTR_GETON int a
IOTR_GETALL int a
IOTR_GETPIDS int a[10]
IOTR_GETUIDS int a[10]
IOTR_GETSYSC int a[10]
IOTR_GETPGRP int a[10]
IOTR_SETOFF int a
IOTR_SETON int a
IOTR_SETALL int a
IOTR_SETPIDS int a[10]
IOTR_SETUIDS int a[10]
IOTR_SETSYSC int a[10]
IOTR_SETPGRP int a[10]
--------------------------------
Examples
A prototype example (with missing parts):
char cmd[BUFSIZ],buf[TR_BUFSIZ];
int pgrp[10],i;
fd = open("/dev/trace",0); /* open the device */
pgrp[0] = dofork(cmd); /* fork the command to trace */
for (i=1;i<TR_PGRP;i++) /* dofork sleeps 2 seconds while */
pgrp[i] = 0; /* we set up to do the trace */
i = ioctl(fd,IOTR_SETPGRP,pgrp);/* set up for the trace */
/* select code goes here */
read(fd,buf,sizeof(buf));
See Also
trace(1), close(2), ioctl(2), open(2), read(2), select(2)
trace(5)