--- Begin Message ---
On Tue, 03 Sep 2024, Denis Ovsienko wrote:
> On Mon, 10 Jun 2024 14:39:01 -0500
> Alberto Perez Bogantes via tcpdump-workers
> <tcpdump-workers@lists.tcpdump.org> wrote:
>
> > We believe that this functionality is well suited for tcpdump because
> > much of the logic used to print an IP address for a specific packet
> > can be reused to access that IP and anonymize it. The logic for
> > dissecting packet headers can be slightly adapted to implement this
> > feature, including anonymization of application headers. For example,
> > much of the code written to print an IP address offered by DHCP can
> > be used to access that address and anonymize it.
>
> Better late than never. Nik Sultana discussed this feature with me in
> April. Whilst trying to explain difficulties of the earlier pull
> request 615, I (rather unexpectedly for myself) came to the same point
> of view as above. Let me paste a copy of my off-list message to
> clarify:
[snip]
Thank you Denis for the great feedback. We'll try to address those
points. In the meantime, we wanted to share a 10-minute video prepared
by Alberto to explain and demo this work:
http://www.cs.iit.edu/~nsultana1/files/tcpdump-cryptopANT.mp4
Best,
Nik
--
http://www.cs.iit.edu/~nsultana1
--- End Message ---
_______________________________________________
tcpdump-workers mailing list -- tcpdump-workers@lists.tcpdump.org
To unsubscribe send an email to tcpdump-workers-le...@lists.tcpdump.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s