Should be fixed now; I created the new pull request #615 and closed #614, so 
that I could use a different branch moving forward.
Thanks for the guidance, Guy!

---
🙋 al...@cyberreboot.org
👾 Cyber Reboot Software Engineer @ In-Q-Tel


-----Original Message-----
From: Guy Harris [mailto:g...@alum.mit.edu]
Sent: Tuesday, July 18, 2017 4:41 PM
To: alice-cyberreboot <al...@cyberreboot.org>
Cc: tcpdump-workers@lists.tcpdump.org
Subject: Re: [tcpdump-workers] Regarding tcpdump pull request #614

On Jul 18, 2017, at 12:44 PM, alice-cyberreboot <al...@cyberreboot.org> wrote:

> In our enhancements these flags are available both when reading from an 
> existing pcap file and when performing a live capture. The caveats are, this 
> currently works solely for the Ethernet link layer (the scope of our project),

So if you request the anonymization for any device with a DLT_ other than 
DLT_EN10MB, it'll fail and print a "that only works for Ethernet" message?

Otherwise, if it *doesn't* fail in that case, it's buggy and needs to be fixed.



"This e-mail, and any attachments hereto, may contain information that is 
privileged, proprietary, confidential and/or exempt from disclosure under law 
and are intended only for the designated addressee(s). If you are not the 
intended recipient of this message, or a person authorized to receive it on 
behalf of the intended recipient, you are hereby notified that you must not 
use, disseminate, copy in any form, or take any action based upon the email or 
information contained therein. If you have received this email in error, please 
permanently and immediately delete it and any copies of it, including any 
attachments, and promptly notify the sender at In-Q-Tel by reply e-mail, fax: 
703-248-3001, or phone: 703-248-3000. Thank you for your cooperation."
_______________________________________________
tcpdump-workers mailing list
tcpdump-workers@lists.tcpdump.org
https://lists.sandelman.ca/mailman/listinfo/tcpdump-workers

Reply via email to