On 01/23/2013 07:28 PM, Chris Gentle wrote:
> On Mon, Jan 21, 2013 at 6:53 PM, walt <w41...@gmail.com
> <mailto:w41ter-re5jqeeqqe8avxtiumw...@public.gmane.org>> wrote:
> 
> Here's my chance to put in a plug for my favorite network utility: 
> good old ngrep.  You can do amazing stuff with ngrep if you want,
> but I normally just use it as an instant cli packet sniffer by
> typing 'ngrep' (as root) and then watch the packets whiz by on my
> terminal.
> 
> 
> I took a peek with ngrep and also with wireshark but it's still not
> obvious whether compression is actually being used.  My connection to
> supernews is SSL enabled so all I see is nntps traffic.  That's why
> some visual feedback would be helpful.  I believe that it IS using
> compression but I can't prove it.

Ah, I omitted that I disable any encryption *before* using ngrep to
view my server's reply.  Any form of encryption will render any
network traffic completely un-parsable by ngrep or any other packet-
sniffer.

Any completely unencrypted/uncompressed nntp traffic should be visible
with ngrep as ordinary human-readable text.

Try ngrep while surfing your usual non-ssl websites with any browser
and you will see the human-readable text whiz by on your terminal.


_______________________________________________
Pan-users mailing list
Pan-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/pan-users

Reply via email to