summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGilbert Ramirez <gram@alumni.rice.edu>2000-06-08 03:09:32 +0000
committerGilbert Ramirez <gram@alumni.rice.edu>2000-06-08 03:09:32 +0000
commit4984788880d99bceffaf1630ea1ff0190c6bd55c (patch)
treed1a002bf249b68039e5e73b3917fd944ee353bbf
parent8130072d19a4aea938056136256ef737322266d9 (diff)
downloadwireshark-4984788880d99bceffaf1630ea1ff0190c6bd55c.tar.gz
Document the fact that we can now read compressed Sniffer files.
svn path=/trunk/; revision=2047
-rw-r--r--README12
-rw-r--r--wiretap/README30
2 files changed, 22 insertions, 20 deletions
diff --git a/README b/README
index fed1a6a536..d175175d3b 100644
--- a/README
+++ b/README
@@ -1,4 +1,4 @@
-$Id: README,v 1.37 2000/04/13 11:20:49 gram Exp $
+$Id: README,v 1.38 2000/06/08 03:09:26 gram Exp $
General Information
------- -----------
@@ -82,12 +82,12 @@ its infancy. However, wiretap is used in ethereal for its ability
to read multiple file types. You can read the following file
formats, and create display filters for them as well:
-libpcap (tcpdump -w), Sniffer (uncompressed), NetXray, Sniffer Pro,
-snoop, Shomiti, LANalyzer, Microsoft Network Monitor, AIX's iptrace,
-RADCOM's WAN/LAN Analyzer, Lucent/Ascend access products, HP-UX's nettl,
-Toshiba's ISDN routers, and the ISDN4BSD "i4btrace" utility.
+libpcap (tcpdump -w), Sniffer (compressed and uncompressed), NetXray,
+Sniffer Pro, snoop, Shomiti, LANalyzer, Microsoft Network Monitor, AIX's
+iptrace, RADCOM's WAN/LAN Analyzer, Lucent/Ascend access products, HP-UX's
+nettl, Toshiba's ISDN routers, and the ISDN4BSD "i4btrace" utility.
-In addition, it can read gzipped versions of any of these files,
+In addition, it can read gzipped versions of any of these files
automatically, if you have the zlib library available when compiling
Ethereal. Ethereal needs a modern version of zlib to be able to use
zlib to read gzipped files; version 1.1.3 is known to work. Versions
diff --git a/wiretap/README b/wiretap/README
index 7d1d621fd0..b68bebf9b2 100644
--- a/wiretap/README
+++ b/wiretap/README
@@ -1,4 +1,4 @@
-$Id: README,v 1.21 2000/02/19 08:49:16 guy Exp $
+$Id: README,v 1.22 2000/06/08 03:09:32 gram Exp $
Wiretap is a library that is being developed as a future replacement for
libpcap, the current standard Unix library for packet capturing. Libpcap
@@ -49,14 +49,14 @@ The "libpcap" file format was determined by reading the "libpcap" code;
wiretap reads the "libpcap" file format with its own code, rather than
using the "libpcap" library's code to read it.
-Sniffer (uncompressed)
+Sniffer (compressed and uncompressed)
-------
-The Sniffer format is documented in the Sniffer manual. Unfortunately,
-Sniffer manuals tend to document only the format for the Sniffer model
-they document. Token-Ring and ethernet seems to work well, though.
-If you have an ATM Sniffer file, both Guy and Gilbert would be *very*
-interested in receiving a sample. (see 'AUTHORS' file for our e-mail
-addresses).
+The uncompressed Sniffer format is documented in the Sniffer manual.
+Unfortunately, Sniffer manuals tend to document only the format for
+the Sniffer model they document. Token-Ring and ethernet seems to work
+well, though. If you have an ATM Sniffer file, both Guy and Gilbert
+would be *very* interested in receiving a sample. (see 'AUTHORS' file
+for our e-mail addresses).
LANalyzer
---------
@@ -118,12 +118,14 @@ should work.
Toshiba ISDN Router
-------------------
An under-documented command that the router supports in a telnet session
-is "snoop" (not related to the Solaris "snoop" command). If you give it
-the "dump" option, you'll get a hex dump of all packets across the router
-(except of your own telnet session -- good thinking Toshiba!). You can
-select a certain channel to sniff (LAN, B1, B2, D), but the default is all
-channels. You save this hex dump to disk with 'script' or by 'telnet |
-tee'. Wiretap will read the ASCII hex dump and convert it to binary data.
+is "snoop" (not related to the Solaris "snoop" command). If you give
+it the "dump" option (either by letting "snoop" query you for its next
+argument, or typing "snoop dump" on the command line), you'll get a hex
+dump of all packets across the router (except of your own telnet session
+-- good thinking Toshiba!). You can select a certain channel to sniff
+(LAN, B1, B2, D), but the default is all channels. You save this hex
+dump to disk with 'script' or by 'telnet | tee'. Wiretap will read the
+ASCII hex dump and convert it to binary data.
Gilbert Ramirez <gram@xiexie.org>
Guy Harris <guy@alum.mit.edu>