No problem; would such a patch be eligible for backport to 4.7?

Regards,

Noah 

> On Dec 3, 2015, at 8:59 AM, Michael Richardson <m...@sandelman.ca> wrote:
> 
> 
> Noah <noah.ro...@gmail.com> wrote:
>> I've written a small patch against HEAD which adds support for decoding
>> DNS traffic on nonstandard ports; useful for those of us who run DNS
>> serves behind VIPs, for instance. I haven't written any tests as yet,
>> however there aren't any DNS tests set up yet anyway. Happy to write
>> some if that would speed the inclusion of the update. I've committed
>> the patch to my fork of tcpdump on github, run tests, etc.  How should
>> I proceed from here, just issue the pull request?
> 
> Yes, but we'll want to see some tests.
> That we haven't any tests shouldn't stop you: tcpdump -w some packets that
> you don't mind sharing, on both port 53 and a not port 53.  Add a list to
> tests/TESTLIST, without the -T domain, and you should of course, not see the
> non-port-53 decoded, and a line *with* -T domain, and you should see
> the not-port-53 packets decoded.
> 
> --
> ]               Never tell me the odds!                 | ipv6 mesh networks [
> ]   Michael Richardson, Sandelman Software Works        | network architect  [
> ]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    
> [
> 
_______________________________________________
tcpdump-workers mailing list
tcpdump-workers@lists.tcpdump.org
https://lists.sandelman.ca/mailman/listinfo/tcpdump-workers

Reply via email to