diff options
author | David E. O'Brien <obrien@FreeBSD.org> | 1998-09-15 03:06:26 +0000 |
---|---|---|
committer | David E. O'Brien <obrien@FreeBSD.org> | 1998-09-15 03:06:26 +0000 |
commit | 9082610c961a1498fb7e71a992b7baf35384140d (patch) | |
tree | ce99fb9db9f8f173a755a9dc23a0d773ed771ccd /net | |
parent | aacf2f6e764bbb10f722254988e9143c600b3a44 (diff) | |
download | ports-9082610c961a1498fb7e71a992b7baf35384140d.tar.gz ports-9082610c961a1498fb7e71a992b7baf35384140d.zip |
Notes
Diffstat (limited to 'net')
-rw-r--r-- | net/smbtcpdump/files/patch-01 | 288 | ||||
-rw-r--r-- | net/smbtcpdump/pkg-descr | 6 |
2 files changed, 292 insertions, 2 deletions
diff --git a/net/smbtcpdump/files/patch-01 b/net/smbtcpdump/files/patch-01 new file mode 100644 index 000000000000..4664794b21cb --- /dev/null +++ b/net/smbtcpdump/files/patch-01 @@ -0,0 +1,288 @@ +--- tcpdump.1.orig Sun Jul 14 19:45:04 1996 ++++ tcpdump.1 Mon Sep 14 20:03:37 1998 +@@ -20,12 +20,12 @@ + .\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF + .\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. + .\" +-.TH TCPDUMP 1 "14 July 1996" ++.TH SMBTCPDUMP 1 "14 July 1996" + .SH NAME +-tcpdump \- dump traffic on a network ++smbtcpdump \- dump traffic on a network (supports SMB related protocols) + .SH SYNOPSIS + .na +-.B tcpdump ++.B smbtcpdump + [ + .B \-deflnNOpqStvx + ] [ +@@ -65,11 +65,20 @@ + .ad + .SH DESCRIPTION + .LP +-\fITcpdump\fP prints out the headers of packets on a network interface +-that match the boolean \fIexpression\fP. ++\fIsmbTcpdump\fP prints out the headers of packets on a network interface ++that match the boolean \fIexpression\fP. The easiest way to capture ++SMB related traffic is to envoke ++.I smbtcpdump ++as: ++.in +.5i ++.nf ++\fBsmbtcpdump -s 1500 'port 139 and host foo'\fR ++.fi ++.in -.5i ++.LP + .B Under SunOS with nit or bpf: + To run +-.I tcpdump ++.I smbtcpdump + you must have read access to + .I /dev/net + or +@@ -86,7 +95,7 @@ + promiscuous-mode operation using + .IR pfconfig (8), + any user may run +-.BR tcpdump . ++.BR smbtcpdump . + .B Under BSD: + You must have read access to + .IR /dev/bpf* . +@@ -122,7 +131,7 @@ + .TP + .B \-i + Listen on \fIinterface\fP. +-If unspecified, \fItcpdump\fP searches the system interface list for the ++If unspecified, \fIsmbtcpdump\fP searches the system interface list for the + lowest numbered, configured up interface (excluding loopback). + Ties are broken by choosing the earliest match. + .TP +@@ -130,15 +139,15 @@ + Make stdout line buffered. Useful if you want to see the data + while capturing it. E.g., + .br +-``tcpdump\ \ \-l\ \ |\ \ tee dat'' or +-``tcpdump\ \ \-l \ \ > dat\ \ &\ \ tail\ \ \-f\ \ dat''. ++``smbtcpdump\ \ \-l\ \ |\ \ tee dat'' or ++``smbtcpdump\ \ \-l \ \ > dat\ \ &\ \ tail\ \ \-f\ \ dat''. + .TP + .B \-n + Don't convert addresses (i.e., host addresses, port numbers, etc.) to names. + .TP + .B \-N + Don't print domain name qualification of host names. E.g., +-if you give this flag then \fItcpdump\fP will print ``nic'' ++if you give this flag then \fIsmbtcpdump\fP will print ``nic'' + instead of ``nic.ddn.mil''. + .TP + .B \-O +@@ -430,7 +439,7 @@ + [In the case of FDDI (e.g., `\fBfddi protocol arp\fR'), the + protocol identification comes from the 802.2 Logical Link Control + (LLC) header, which is usually layered on top of the FDDI header. +-\fITcpdump\fP assumes, when filtering on the protocol identifier, ++\fIsmbTcpdump\fP assumes, when filtering on the protocol identifier, + that all FDDI packets include an LLC header, and that the LLC header + is in so-called SNAP format.] + .IP "\fBdecnet src \fIhost\fR" +@@ -462,7 +471,7 @@ + .in -.5i + where \fIp\fR is one of the above protocols. + Note that +-\fItcpdump\fP does not currently know how to parse these protocols. ++\fIsmbtcpdump\fP does not currently know how to parse these protocols. + .IP "\fBtcp\fR, \fBudp\fR, \fBicmp\fR" + Abbreviations for: + .in +.5i +@@ -541,7 +550,7 @@ + .fi + .in -.5i + .LP +-Expression arguments can be passed to tcpdump as either a single argument ++Expression arguments can be passed to smbtcpdump as either a single argument + or as multiple arguments, whichever is more convenient. + Generally, if the expression contains Shell metacharacters, it is + easier to pass it as a single, quoted argument. +@@ -551,21 +560,21 @@ + To print all packets arriving at or departing from \fIsundown\fP: + .RS + .nf +-\fBtcpdump host sundown\fP ++\fBsmbtcpdump host sundown\fP + .fi + .RE + .LP + To print traffic between \fIhelios\fR and either \fIhot\fR or \fIace\fR: + .RS + .nf +-\fBtcpdump host helios and \\( hot or ace \\)\fP ++\fBsmbtcpdump host helios and \\( hot or ace \\)\fP + .fi + .RE + .LP + To print all IP packets between \fIace\fR and any host except \fIhelios\fR: + .RS + .nf +-\fBtcpdump ip host ace and not helios\fP ++\fBsmbtcpdump ip host ace and not helios\fP + .fi + .RE + .LP +@@ -573,7 +582,7 @@ + .RS + .nf + .B +-tcpdump net ucb-ether ++smbtcpdump net ucb-ether + .fi + .RE + .LP +@@ -583,7 +592,7 @@ + .RS + .nf + .B +-tcpdump 'gateway snup and (port ftp or ftp-data)' ++smbtcpdump 'gateway snup and (port ftp or ftp-data)' + .fi + .RE + .LP +@@ -593,7 +602,7 @@ + .RS + .nf + .B +-tcpdump ip and not net \fIlocalnet\fP ++smbtcpdump ip and not net \fIlocalnet\fP + .fi + .RE + .LP +@@ -602,7 +611,7 @@ + .RS + .nf + .B +-tcpdump 'tcp[13] & 3 != 0 and not src and dst net \fIlocalnet\fP' ++smbtcpdump 'tcp[13] & 3 != 0 and not src and dst net \fIlocalnet\fP' + .fi + .RE + .LP +@@ -610,7 +619,7 @@ + .RS + .nf + .B +-tcpdump 'gateway snup and ip[2:2] > 576' ++smbtcpdump 'gateway snup and ip[2:2] > 576' + .fi + .RE + .LP +@@ -620,7 +629,7 @@ + .RS + .nf + .B +-tcpdump 'ether[0] & 1 = 0 and ip[16] >= 224' ++smbtcpdump 'ether[0] & 1 = 0 and ip[16] >= 224' + .fi + .RE + .LP +@@ -629,12 +638,12 @@ + .RS + .nf + .B +-tcpdump 'icmp[0] != 8 and icmp[0] != 0" ++smbtcpdump 'icmp[0] != 8 and icmp[0] != 0" + .fi + .RE + .SH OUTPUT FORMAT + .LP +-The output of \fItcpdump\fP is protocol dependent. The following ++The output of \fIsmbtcpdump\fP is protocol dependent. The following + gives a brief description and examples of most of the formats. + .de HD + .sp 1.5 +@@ -647,7 +656,7 @@ + On ethernets, the source and destination addresses, protocol, + and packet length are printed. + .LP +-On FDDI networks, the '-e' option causes \fItcpdump\fP to print ++On FDDI networks, the '-e' option causes \fIsmbtcpdump\fP to print + the `frame control' field, the source and destination addresses, + and the packet length. (The `frame control' field governs the + interpretation of the rest of the packet. Normal packets (such +@@ -707,7 +716,7 @@ + replies with its ethernet address (in this example, ethernet addresses + are in caps and internet addresses in lower case). + .LP +-This would look less redundant if we had done \fBtcpdump \-n\fP: ++This would look less redundant if we had done \fBsmbtcpdump \-n\fP: + .RS + .nf + .sp .5 +@@ -716,7 +725,7 @@ + .fi + .RE + .LP +-If we had done \fBtcpdump \-e\fP, the fact that the first packet is ++If we had done \fBsmbtcpdump \-e\fP, the fact that the first packet is + broadcast and the second is point-to-point would be visible: + .RS + .nf +@@ -734,7 +743,7 @@ + .LP + \fI(N.B.:The following description assumes familiarity with + the TCP protocol described in RFC-793. If you are not familiar +-with the protocol, neither this description nor tcpdump will ++with the protocol, neither this description nor smbtcpdump will + be of much use to you.)\fP + .LP + The general format of a tcp protocol line is: +@@ -794,7 +803,7 @@ + flags were set. + The packet contained no data so there is no data sequence number. + Note that the ack sequence +-number is a small integer (1). The first time \fBtcpdump\fP sees a ++number is a small integer (1). The first time \fBsmbtcpdump\fP sees a + tcp `conversation', it prints the sequence number from the packet. + On subsequent packets of the conversation, the difference between + the current packet's sequence number and this initial sequence number +@@ -982,7 +991,7 @@ + NFS traffic. + .LP + NFS reply packets do not explicitly identify the RPC operation. Instead, +-\fItcpdump\fP keeps track of ``recent'' requests, and matches them to the ++\fIsmbtcpdump\fP keeps track of ``recent'' requests, and matches them to the + replies using the transaction ID. If a reply does not closely follow the + corresponding request, it might not be parsable. + .HD +@@ -1170,12 +1179,13 @@ + Steven McCanne (mccanne@ee.lbl.gov), all of the + Lawrence Berkeley Laboratory, University of California, Berkeley, CA. + .SH BUGS +-Please send bug reports to tcpdump@ee.lbl.gov or libpcap@ee.lbl.gov. ++This is a modified version of tcpdump. Please do not bother the tcpdump ++authors with bug reports. + .LP + NIT doesn't let you watch your own outbound traffic, BPF will. + We recommend that you use the latter. + .LP +-\fItcpdump\fP for Ultrix requires Ultrix version 4.0 or later; the kernel ++\fIsmbtcpdump\fP for Ultrix requires Ultrix version 4.0 or later; the kernel + has to have been built with the \fIpacketfilter\fP pseudo-device driver + (see + .IR packetfilter (4)). +@@ -1190,7 +1200,7 @@ + you're monitoring a busy network. + .LP + On Sun systems prior to release 3.2, NIT is very buggy. +-If run on an old system, tcpdump may crash the machine. ++If run on an old system, smbtcpdump may crash the machine. + .LP + Some attempt should be made to reassemble IP fragments or, at least + to compute the right length for the higher level protocol. +@@ -1198,7 +1208,7 @@ + Name server inverse queries are not dumped correctly: The (empty) + question section is printed rather than real query in the answer + section. Some believe that inverse queries are themselves a bug and +-prefer to fix the program generating them rather than tcpdump. ++prefer to fix the program generating them rather than smbtcpdump. + .LP + Apple Ethertalk DDP packets could be dumped as easily as KIP DDP + packets but aren't. diff --git a/net/smbtcpdump/pkg-descr b/net/smbtcpdump/pkg-descr index b860b5b897c2..952f72b1bb9d 100644 --- a/net/smbtcpdump/pkg-descr +++ b/net/smbtcpdump/pkg-descr @@ -4,10 +4,12 @@ of detail. To capture all SMB packets going to or from host "fred" try this: - tcpdump -i eth0 -s 1500 port 139 host fred + tcpdump -s 1500 'port 139 and host fred' If you want name resolution or browse packets then try ports 137 and -138 respectively. +138 respectively: + + tcpdump -s 1500 '(port 139 or 138 or 137) and host fred' Example Output: |