From owner-freebsd-questions Fri Feb 5 08:20:15 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA07311 for freebsd-questions-outgoing; Fri, 5 Feb 1999 08:20:15 -0800 (PST) (envelope-from owner-freebsd-questions@FreeBSD.ORG) Received: from triton.press.southern.edu (Triton.press.southern.edu [209.142.169.171]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA07304 for ; Fri, 5 Feb 1999 08:20:12 -0800 (PST) (envelope-from root@triton.press.southern.edu) Received: from localhost (root@localhost) by triton.press.southern.edu (8.8.8/8.8.8) with SMTP id LAA09422 for ; Fri, 5 Feb 1999 11:30:46 -0500 (EST) (envelope-from root@triton.press.southern.edu) Date: Fri, 5 Feb 1999 11:30:46 -0500 (EST) From: Charlie ROOT To: freebsd-questions@FreeBSD.ORG Subject: /dev/bpf0 Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I was wanting to run tcpdump, but I really didn't want to expose my system to the vulnerability of having /dev/bpf0 configured. I was wondering if anyone has succeeded in implementing the Berekely Packet Filter as a loadable kernel module. If so I would love to see the source. Thanks. Brett Miller To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message