Hello again,
Here's a new update/summary of my PR:
- Removed short options in favor of long ones for three features -
zeroing out TCP/UDP payload in IPv4 packets (--zero-tcpudp-payload), removing
said payloads completely (--no-tcpudp-payload), and masking external IP
addresses to a gi
Resending, as it didn't seem to make the list the first time...
Hello all,
In my attempt to get this pull request toward completion, I intend to rebase
the branch's commit history to one concise commit. Before I do so, however, I
would like to elicit some suggestions (if any) regarding m
Hello all,
In my attempt to get this pull request toward completion, I intend to rebase
the branch’s commit history to one concise commit. Before I do so, however, I
would like to elicit some suggestions (if any) regarding my proposed long
options.
There are currently two main features to this
Hi there!
I finally got around to fixing my cloned repo again to get the TravisCI compile
tests working, and have added some tests for my requested flags. I was
wondering if I could get feedback on my branch, or if it was good to be pulled.
It’s been merged with the latest version of your maste
...@alum.mit.edu]
Sent: Tuesday, July 18, 2017 4:41 PM
To: alice-cyberreboot
Cc: tcpdump-workers@lists.tcpdump.org
Subject: Re: [tcpdump-workers] Regarding tcpdump pull request #614
On Jul 18, 2017, at 12:44 PM, alice-cyberreboot wrote:
> In our enhancements these flags are available both when read
Good point! Will fix this now.
---
🙋 al...@cyberreboot.org
👾 Cyber Reboot Software Engineer @ In-Q-Tel
-Original Message-
From: Guy Harris [mailto:g...@alum.mit.edu]
Sent: Tuesday, July 18, 2017 4:41 PM
To: alice-cyberreboot
Cc: tcpdump-workers@lists.tcpdump.org
Subject: Re
Hi everyone!
I’m writing regarding a pull request I submitted (#614).
My workgroup is currently working on a project utilizing machine-learning and
software-defined networking to detect and respond to malicious network
activity. We are currently focused on internal Ethernet traffic, and one of