in reply to networking over the loopback
Yes, tcpdump can indeed watch the loopback.
tcpdump -i lo -w /tmp/loopback.log
This will log all packets on lo to the file /tmp/loopback.log. You can then read/analyze them with:
tcpdump -r /tmp/loopback.log 'filter stuff here'
Update:
I thought about this a little more this morning, and if you have the extra resources, and know a little about writing rules, you should be able to use an IDS (intrusion detection system) -- like Snort -- to monitor for/alert on specific events. Now that I think about it, an IDS could be a really good debugging tool for a project like you describe. (And, if you get to the point where you are testing on multiple system on a LAN, your IDS will still be able to help as long as it is located on the same segment.)
|
---|
Replies are listed 'Best First'. | |
---|---|
Re: Re: networking over the loopback
by rob_au (Abbot) on May 22, 2002 at 04:21 UTC |
In Section
Seekers of Perl Wisdom