I think this is probably due to the SOCK_PACKET changes more than
firewall changes, actually.
> What I want to do is this: I have the firewall block certain
> packets, but I would like to analyse these packets to see if they
> are in fact malicious in nature. Is this possible?
Sure. You can have ipchains copy a given number of bytes to a NETLINK
device; in this case instead of `ipchains -A input -s foobar.com -j
REJECT' do `ipchains -A input -s foobar.com -j REJECT -o 128' and then
read the packets off a device (36,3). Download libfw from the
ipchains homepage for an example.
Rusty.
-- .sig lost in the mail.- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/