lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 12 Jan 2010 03:23:05 -0800 (PST) From: David Miller <davem@...emloft.net> To: ubraun@...ux.vnet.ibm.com Cc: netdev@...r.kernel.org, linux-s390@...r.kernel.org, frank.blaschka@...ibm.com, ursula.braun@...ibm.com Subject: Re: [patch 1/3] [PATCH] qeth: HiperSockets Network Traffic Analyzer From: Ursula Braun <ubraun@...ux.vnet.ibm.com> Date: Tue, 12 Jan 2010 12:19:44 +0100 > An HS NTA device in Linux on System z is a specialized HiperSockets > device managed by the qeth driver and initialized specifically for > sniffing. The trigger for an HS device to act as a Network Traffic > Analyzer is the sysfs attribute "sniffer". If this attribute is set to > 1, the NTA-specific initialization is started when the HS device is > brought online. Traffic sniffing starts, once the device is switched > into promiscuous mode, for instance by invoking the tcpdump-tool. Sounds like something which might be useful for other virtualized environments. At worst, they would be able to provide some similar facility, and therefore the configuration mechanism to turn this on should be unified. Perhaps an ethtool boolean flag setting or similar, rather than a baroque and driver specific sysfs knob. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists