Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Oct 1999 17:28:21 -0700 (PDT)
From:      Archie Cobbs <archie@whistle.com>
To:        andre@netvision.com.br (Andre Luiz dos Santos)
Cc:        freebsd-net@FreeBSD.ORG
Subject:   Re: Divert Sockets
Message-ID:  <199910110028.RAA11266@bubba.whistle.com>
In-Reply-To: <99100810404704.04076@nv12.netvision.com.br> from Andre Luiz dos Santos at "Oct 8, 1999 10:35:06 am"

next in thread | previous in thread | raw e-mail | index | archive | help
Andre Luiz dos Santos writes:
>   Is there anyway to me know the source MAC address of a packet divert'ed to a
> divert socket? Like in BPF, where you've the headers of the ethernet packet.

No. Divert works at the IP layer is not specific to Ethernet, and so
doesn't provide any way to get the Ethernet header.. it's already long
gone by the time divert sees it anyway.

>   If this is not possible, there are anyway to me block an IP packet by their
> MAC address?

Not without a custom kernel hack AFAIK.

-Archie

___________________________________________________________________________
Archie Cobbs   *   Whistle Communications, Inc.  *   http://www.whistle.com


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199910110028.RAA11266>