netdev
[Top] [All Lists]

Re: Debug kernel network hook chain or why has Check Point Firewall modu

To: Andi Kleen <ak@xxxxxxx>
Subject: Re: Debug kernel network hook chain or why has Check Point Firewall module problems with IPv6
From: "Peter Bieringer" <pb@xxxxxxxxxxxx>
Date: Mon, 22 Apr 2002 12:47:37 GMT
Cc: Peter Bieringer <pb@xxxxxxxxxxxx>, Maillist netdev <netdev@xxxxxxxxxxx>
In-reply-to: <20020422120618.A29547@wotan.suse.de>
References: <22830000.1019458033@localhost> <20020422092252.A17861@wotan.suse.de> <20020422085346.12822.qmail@titan.bieringer.de> <20020422120618.A29547@wotan.suse.de>
Sender: owner-netdev@xxxxxxxxxxx
Andi Kleen writes:

> On Mon, Apr 22, 2002 at 08:53:45AM +0000, Peter Bieringer wrote:
> > Is such IPv4 hook not seeing packets leaving a dual-stack application like
> > openssh? Is there any scheme (the way such packet takes) available for
> > visualisation.
> 
> The v4 hook only sees packets that are sent as v4. The v6 hook only v6.
> It has nothing to do with the application using v4-mapped-on-v6 sockets 
> or not.

Thanks for reply. Is there any tool available which can display which
application has registered which network hooks?

TIA,
 Peter

<Prev in Thread] Current Thread [Next in Thread>