From f751b038b8a1a93b4b7ed8463a91ca1176aa2168 Mon Sep 17 00:00:00 2001 From: Daniel Borkmann Date: Sat, 5 Nov 2011 16:47:52 +0100 Subject: [PATCH] Update on readme. The release date for the -curr versions will be put there intead into the website. --- README | 22 ++++++++-------------- 1 file changed, 8 insertions(+), 14 deletions(-) diff --git a/README b/README index b1f8866e..d7d856cb 100644 --- a/README +++ b/README @@ -12,9 +12,9 @@ Linux network analyzer and > `' '` < / networking toolkit. ) ,.==., ( | (|/--~~--\|)-' - / + Release: 2011-xx-xx / ( ___ - \__.=|___E + Web: http://netsniff-ng.org \__.=|___E The gain of performance is reached by 'zero-copy' mechanisms, so that the kernel does not need to copy packets from kernelspace to userspace and vice @@ -30,9 +30,8 @@ security specialists. The netsniff-ng toolkit [1] currently consists of the following utilities: * netsniff-ng: the 'zero-copy' sniffer (and pcap replayer) itself - * arppoison: an ARP cache poisoning utility (todo) + * arpswirl: an ARP cache poisoning utility (todo) * trafgen: a powerful 'zero-copy' network packet generator - * tgsh: a trafgen Cisco-like frontend shell for appliances (todo) * flowtop: a top-like netfilter connection tracking tool (todo) * curvetun: a lightweight curve25519-based multiuser IP tunnel * ashunt: an Autonomous System trace route utility @@ -41,19 +40,15 @@ The netsniff-ng toolkit [1] currently consists of the following utilities: The netsniff-ng toolkit is an Open Source project covered by the GNU General Public License. For any questions or feedback about netsniff-ng you are welcome -to leave us a message to . This project is purely -non-commercial and will always stay that way! netsniff-ng is primary developed -by Daniel Borkmann and Emmanuel Roullit [8]. +to leave us a message to or to our mailing list +at (Note: you have to register first). This +project is purely non-commercial and will always stay that way! Also, have a look at our FAQ [2] for answering your questions. Furthermore, we have a development blog [3] where we sometimes drop some interesting things or news for the outside world! A public repository of the old stable releases (which you probably do not want to have a look at), can be found here [4]. -Sometimes we also hang out in IRC at #netsniff-ng on freenode.org. A mailing -list for netsniff-ng moderated (spam free) user discussions is open to the -public, too. Subscribe and mail to . - By the way, some notes on zero-copy ... You might want to have NAPI drivers [5] enabled in your kernel to reduce interrupt load and for high-speed (= relative to the CPU speed) PCAP dumping and replay, a fast SSD isn't too bad either, @@ -61,7 +56,7 @@ and make sure to use netsniff-ngs scatter/gather or mmap I/O options. Next to this, (and this refers to packet generation as well), a 10-Gbit/s-Ethernet NIC, an appropriate amount of RAM and a fast CPU is recommended. Furthermore, you should bind the netsniff-ng tools to a specific CPU via commandline option -(i.e. --bind 0). Some further recommendations can be found in [6] [9]. Also, +(i.e. --bind 0). Some further recommendations can be found in [6] [8]. Also, Eric Dumazets BPF Just-in-Time compiler can speed up the critical path [7]. You might want to have a look at INSTALL, REPORTING-BUGS, HACKING, CODING, @@ -75,6 +70,5 @@ hacking! [5] http://www.linuxfoundation.org/collaborate/workgroups/networking/napi [6] http://datatag.web.cern.ch/datatag/howto/tcp.html [7] http://thread.gmane.org/gmane.linux.network/191115 -[8] git shortlog -s -n | perl -pe 's/^\s*(\d+)\s+(.+)$/$2 ($1)/g' -[9] http://timetobleed.com/useful-kernel-and-driver-performance-tweaks-for-your-linux-server/ +[8] http://bit.ly/3XbBrM -- 2.11.4.GIT