d42132137f
Based on PR 41779 by Fredrik Pettai. Version 20090128: I added a new feature to dnstop today that filters on "refused" response codes. This might be useful in tracking the ongoing DNS-based DDoS attacks. To use this new feature: dnstop -R -f refused eth0 Version 20080321: The interesting changes came in a patch from Dave Plonka: Fixed a bug that cause dnstop to Memory fault when processing a DNS packet greater than PCAP_SNAPLEN (previously 1460) bytes in size. Raised PCAP_SNAPLEN to 65535 to avoid truncating large DNS packets. Eliminated unnecessary stack buffers and memcpy calls when handling packets. Also some variables have been added to the Makefile at the request of a packager so that it may be easier to customize where files are installed, etc.
5 lines
251 B
Text
5 lines
251 B
Text
$NetBSD: distinfo,v 1.13 2009/07/25 10:26:17 obache Exp $
|
|
|
|
SHA1 (dnstop-20090128.tar.gz) = 17eac98a9065e8b25ea13aa65b647c2b090850f1
|
|
RMD160 (dnstop-20090128.tar.gz) = aa995e7163dcc8575e59065bcc4d6d92812aace5
|
|
Size (dnstop-20090128.tar.gz) = 68132 bytes
|