SHA256
1
0
forked from pool/netsniff-ng

Accepting request 498444 from home:jengelh:branches:network:utilities

tcpdump does mmap too, so nothing special to see here

OBS-URL: https://build.opensuse.org/request/show/498444
OBS-URL: https://build.opensuse.org/package/show/network:utilities/netsniff-ng?expand=0&rev=22
This commit is contained in:
Martin Hauke 2017-05-26 19:46:38 +00:00 committed by Git OBS Bridge
parent 04d2364c94
commit ed8538f45b
2 changed files with 15 additions and 13 deletions

View File

@ -1,3 +1,8 @@
-------------------------------------------------------------------
Fri May 26 10:24:39 UTC 2017 - jengelh@inai.de
- Trim filler wording.
------------------------------------------------------------------- -------------------------------------------------------------------
Tue Apr 11 13:35:18 UTC 2017 - mardnh@gmx.de Tue Apr 11 13:35:18 UTC 2017 - mardnh@gmx.de

View File

@ -20,7 +20,7 @@
Name: netsniff-ng Name: netsniff-ng
Version: 0.6.3 Version: 0.6.3
Release: 0 Release: 0
Summary: High Performance Network Sniffer for Packet Inspection Summary: Network Sniffer for Packet Inspection
License: GPL-2.0+ License: GPL-2.0+
Group: Productivity/Networking/Diagnostic Group: Productivity/Networking/Diagnostic
Url: http://netsniff-ng.org/ Url: http://netsniff-ng.org/
@ -48,27 +48,24 @@ BuildRequires: zlib-devel
BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRoot: %{_tmppath}/%{name}-%{version}-build
%description %description
netsniff-ng is a high performance Linux network sniffer for packet inspection. netsniff-ng is a network sniffer for packet inspection. It is similar
Basically, it is similar to tcpdump, but it doesn't need syscalls for fetching to tcpdump, and likewise uses a memory mapped area for accessing
packets. Instead, it uses an memory mapped area within kernel space for packets. It can be used for protocol analysis and reverse
accessing packets without the need of copying them to userspace ('zero-copy' engineering, network debugging, measurement of performance
mechanism). It can be used for protocol analysis and reverse engineering, throughput, or network statistics creation of incoming packets on
network debugging, measurement of performance throughput, or network statistics central network nodes like routers or firewalls.
creation of incoming packets on central network nodes like routers or
firewalls.
The netsniff-ng toolkit consists of the following utilities: The netsniff-ng toolkit consists of the following utilities:
* netsniff-ng, a fast zero-copy analyzer, pcap capturing and replaying tool * netsniff-ng, a zero-copy analyzer, pcap capturing and replaying tool
* trafgen, a multithreaded low-level zero-copy network packet generator * trafgen, a multithreaded low-level zero-copy network packet generator
* mausezahn, high-level packet generator for HW/SW appliances with Cisco-CLI * mausezahn, high-level packet generator for HW/SW appliances with Cisco-CLI
* bpfc, a Berkeley Packet Filter compiler, Linux BPF JIT disassembler * bpfc, a Berkeley Packet Filter compiler, Linux BPF JIT disassembler
* ifpps, a top-like kernel networking statistics tool * ifpps, a top-like kernel networking statistics tool
* flowtop, a top-like netfilter connection tracking tool * flowtop, a top-like netfilter connection tracking tool
* curvetun, a lightweight curve25519-based IP tunnel * curvetun, a curve25519-based IP tunnel
* astraceroute, an autonomous system (AS) trace route utility * astraceroute, an autonomous system (AS) trace route utility
%prep %prep
%setup -q %setup -q
%patch0 -p1 %patch0 -p1