On Mon, Oct 3, 2011 at 10:26 AM, Posey Mak <poseyb...@ymail.com> wrote:
> what's the reason behind it...is it where tcpreplay injects the
> packet...bypassing the kernel's ability to push the packet up to the
> application? i coded up a simple client to multicast data to the loopback
> via socket call...i see that the src and dest mac addresses are both zeroed
> out when captured with tcpdump. i used tcpreplay-edit to zero out both the
> src and dest mac addresses...and recalc checksum...it still does not work.
> thoughts? thanks.

Basically, tcpreplay injects the packets between the network card
driver and the IP stack and thereby bypasses the IP stack completely.
tcpdump/wireshark are sniffing at the same level which is why you can
see the packets being sent.


-- 
Aaron Turner
http://synfin.net/         Twitter: @synfinatic
http://tcpreplay.synfin.net/ - Pcap editing and replay tools for Unix & Windows
Those who would give up essential Liberty, to purchase a little temporary
Safety, deserve neither Liberty nor Safety.
    -- Benjamin Franklin
"carpe diem quam minimum credula postero"

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Tcpreplay-users mailing list
Tcpreplay-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tcpreplay-users
Support Information: http://tcpreplay.synfin.net/trac/wiki/Support

Reply via email to