Re: [tcpdump-workers] reconstruct HTTP requests in custom sniffer

2011-01-07 Thread Cedric Cellier
> I am asked to write a custom sniffer with libpcap on Linux that has to > handle a load of 50.000 packets per second. The sniffer has to detect all > HTTP requests and dump the URI with additional information, such as > request size and possibly response time/size. Looks very similar to : http:

Re: [tcpdump-workers] reconstruct HTTP requests in custom sniffer

2011-01-10 Thread Cedric Cellier
-[ Sun, Jan 09, 2011 at 02:19:53PM +0900, Andrej van der Zee ] > Is there anything to say about a rough time-schedule? Support for TCP segmentation as well as new parsers that use this feature should be pushed before end of week. Concerning the capture of POST messages we should probably start

Re: [tcpdump-workers] HUGE packet-drop

2011-01-24 Thread Cedric Cellier
Maybe you use a custom kernel lacking the option to enable mmap sharing of packets from kernel to userland ? - This is the tcpdump-workers list. Visit https://cod.sandelman.ca/ to unsubscribe.

Re: [tcpdump-workers] HUGE packet-drop

2011-01-24 Thread Cedric Cellier
Quick guess : maybe you build a custom kernel without the option to enable mmap sharing of packets with userland ? - This is the tcpdump-workers list. Visit https://cod.sandelman.ca/ to unsubscribe.

Re: [tcpdump-workers] capturing on both interfaces simultaneously

2011-12-10 Thread Cedric Cellier
> I got it to work. (...) > > default:          /* We got traffic */ > > pcap_dispatch(pcap0,-1, (void *) packet_callback, NULL); > > pcap_dispatch(pcap1,-1, (void *) packet_callback2, NULL); So that other may benefit from it in the future, I guess your fixed version looks like: default: if (t