Hi Dima,
Hi Timo.
Can you try the tcpflow from experimental? It's a major upgrade from the
tcpflow in =unstable, and is supposed to support ipv6.
thanks for asking but I never saw your questions :( If you want me to
see the questions you need to send them to
702556-submit...@bugs.debian.org
Hi,
it seems that tcptrace works for this task:
$ tcptrace -e testcase.pcap
1 arg remaining, starting with 'testcase.pcap'
Ostermann's tcptrace -- version 6.6.7 -- Thu Nov 4, 2004
18 packets seen, 18 TCP packets traced
elapsed wallclock time: 0:00:00.004153, 4334 pkts/sec analyzed
trace file
Hi Timo.
Can you try the tcpflow from experimental? It's a major upgrade from the
tcpflow in =unstable, and is supposed to support ipv6.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
I just tried the new tcpflow, and it does work:
dima@shorty:/tmp/testcase$ tcpflow -r testcase.pcap
dima@shorty:/tmp/testcase$ ls
127.000.000.001.39885-127.000.000.001.03000 ::1.36781-::1.03000 report.xml
testcase.pcap
4 matches
Mail list logo