[tcpdump-workers] Re: upcoming tcpslice 1.8

2024-09-30 Thread Denis Ovsienko
On Mon, 09 Sep 2024 15:13:49 -0400
Michael Richardson  wrote:

> Denis Ovsienko  wrote:
> > Let me suggest making tcpslice 1.8 release in 1-2 weeks to
> > avoid yet another oversized change log section.  If anyone sees
> > a good reason not to, please make your point before long.  
> 
> Who are the users of tcpslice?
> Are there any heavy users that would like to identify themselves, and
> verify the releases?

My guess is that tcpslice does not have many users, but from the
occasional bug reports is seems some people still use it.  Many
distributions have a package for it, although many packages are badly
outdated.  Sometimes I notify one or another package maintainer about a
new version, but still in this department it is not uncommon to measure
the feedback loop in years.

I revived tcpslice in 2020 during a COVID lockdown with the intent to
convert some spare time to a few simple bug fixes.  In 2021 it turned
out to be the best guinea pig for the CI improvements (build matrix
etc): it uses libpcap and has a very low build time compared to
tcpdump, so in this department the feedback loop can be measured in
minutes, not hours.  Its purpose since then has been to provide a
testing ground for various improvements (e.g. handling of various
warnings/errors, man page formatting, posix_fadvise(), static builds,
git for releasetar etc) before they are ready to apply to libpcap and
tcpdump.

So, I am going to make the next release anytime soon.

-- 
Denis Ovsienko
___
tcpdump-workers mailing list -- tcpdump-workers@lists.tcpdump.org
To unsubscribe send an email to tcpdump-workers-le...@lists.tcpdump.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s


[tcpdump-workers] Re: [Ext] Re: IP Address Anonymization Feature in tcpdump

2024-09-30 Thread Nik Sultana via tcpdump-workers
--- Begin Message ---
On Tue, 03 Sep 2024, Denis Ovsienko wrote:

> On Mon, 10 Jun 2024 14:39:01 -0500
> Alberto Perez Bogantes via tcpdump-workers
>  wrote:
>
> > We believe that this functionality is well suited for tcpdump because
> > much of the logic used to print an IP address for a specific packet
> > can be reused to access that IP and anonymize it. The logic for
> > dissecting packet headers can be slightly adapted to implement this
> > feature, including anonymization of application headers. For example,
> > much of the code written to print an IP address offered by DHCP can
> > be used to access that address and anonymize it.
>
> Better late than never.  Nik Sultana discussed this feature with me in
> April.  Whilst trying to explain difficulties of the earlier pull
> request 615, I (rather unexpectedly for myself) came to the same point
> of view as above.  Let me paste a copy of my off-list message to
> clarify:
[snip]

Thank you Denis for the great feedback. We'll try to address those
points. In the meantime, we wanted to share a 10-minute video prepared
by Alberto to explain and demo this work:
http://www.cs.iit.edu/~nsultana1/files/tcpdump-cryptopANT.mp4
Best,
Nik

--
http://www.cs.iit.edu/~nsultana1
--- End Message ---
___
tcpdump-workers mailing list -- tcpdump-workers@lists.tcpdump.org
To unsubscribe send an email to tcpdump-workers-le...@lists.tcpdump.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s

[tcpdump-workers] tcpdump -i - not just for Windows any more!

2024-09-30 Thread Guy Harris
ubu22-04$ cat /etc/lsb-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=22.04
DISTRIB_CODENAME=jammy
DISTRIB_DESCRIPTION="Ubuntu 22.04.5 LTS"
ubu22-04$ ifconfig -a
ens33: flags=4163  mtu 1500
inet 172.16.135.246  netmask 255.255.255.0  broadcast 172.16.135.255
inet6 fe80::eee8:133e:43dd:472b  prefixlen 64  scopeid 0x20
ether 00:0c:29:1c:d8:7f  txqueuelen 1000  (Ethernet)
RX packets 637  bytes 651687 (651.6 KB)
RX errors 0  dropped 0  overruns 0  frame 0
TX packets 544  bytes 80233 (80.2 KB)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

...

wlx0013eff12e78: flags=4099  mtu 1500
ether 00:13:ef:f1:2e:78  txqueuelen 1000  (Ethernet)
RX packets 0  bytes 0 (0.0 B)
RX errors 0  dropped 0  overruns 0  frame 0
TX packets 0  bytes 0 (0.0 B)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

I'm not going to type *that* string as an argument to -i.  ens33, OK, but not 
wlx0013eff12e78.

ubu22-04$ tcpdump -D
1.ens33 [Up, Running, Connected]
2.mon0 [Up, Running, Wireless, Associated]
3.any (Pseudo-device that captures on all interfaces) [Up, Running]
4.lo [Up, Running, Loopback]
5.wlx0013eff12e78 [Up, Wireless, Not associated]
6.nflog (Linux netfilter log (NFLOG) interface) [none]
7.nfqueue (Linux netfilter queue (NFQUEUE) interface) [none]
8.dbus-system (D-Bus system bus) [none]
9.dbus-session (D-Bus session bus) [none]

tcpdump -i 5, however, not too bad.
___
tcpdump-workers mailing list -- tcpdump-workers@lists.tcpdump.org
To unsubscribe send an email to tcpdump-workers-le...@lists.tcpdump.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s


[tcpdump-workers] Assistance with Capturing cURL Request using tcpdump

2024-09-30 Thread Kaushal Shriyan
Hi,

I am using Postman to invoke a REST API call. Is there a way to capture the
cURL (https://curl.se/) request (including headers and body) initiated by
the Postman REST API client to the application server running RHEL 8.10 OS,
and then to the backend server/system using tcpdump and analyze the packet
capture (.pcap) file in Wireshark?

The flow is as follows:
Postman → Application server → Proxy server → Backend server.

Headers: Contain metadata about the request, such as content type, user
agent, etc.
Body: Contains the data that we want to send (if any). Typically used with
POST and PUT methods.

Please guide me. Thanks in advance.

Best Regards,

Kaushal
___
tcpdump-workers mailing list -- tcpdump-workers@lists.tcpdump.org
To unsubscribe send an email to tcpdump-workers-le...@lists.tcpdump.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s