Should be fixed now; I created the new pull request #615 and closed #614, so that I could use a different branch moving forward. Thanks for the guidance, Guy!
--- 🙋 al...@cyberreboot.org 👾 Cyber Reboot Software Engineer @ In-Q-Tel -----Original Message----- From: Guy Harris [mailto:g...@alum.mit.edu] Sent: Tuesday, July 18, 2017 4:41 PM To: alice-cyberreboot <al...@cyberreboot.org> Cc: tcpdump-workers@lists.tcpdump.org Subject: Re: [tcpdump-workers] Regarding tcpdump pull request #614 On Jul 18, 2017, at 12:44 PM, alice-cyberreboot <al...@cyberreboot.org> wrote: > In our enhancements these flags are available both when reading from an > existing pcap file and when performing a live capture. The caveats are, this > currently works solely for the Ethernet link layer (the scope of our project), So if you request the anonymization for any device with a DLT_ other than DLT_EN10MB, it'll fail and print a "that only works for Ethernet" message? Otherwise, if it *doesn't* fail in that case, it's buggy and needs to be fixed. "This e-mail, and any attachments hereto, may contain information that is privileged, proprietary, confidential and/or exempt from disclosure under law and are intended only for the designated addressee(s). If you are not the intended recipient of this message, or a person authorized to receive it on behalf of the intended recipient, you are hereby notified that you must not use, disseminate, copy in any form, or take any action based upon the email or information contained therein. If you have received this email in error, please permanently and immediately delete it and any copies of it, including any attachments, and promptly notify the sender at In-Q-Tel by reply e-mail, fax: 703-248-3001, or phone: 703-248-3000. Thank you for your cooperation." _______________________________________________ tcpdump-workers mailing list tcpdump-workers@lists.tcpdump.org https://lists.sandelman.ca/mailman/listinfo/tcpdump-workers