<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCPDUMP R80.10  in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8179#M1012</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reported version of tcpdump/libpcap did not change between R77.30 and R80.10 (3.9.4/0.9.4), at least between R77.30 vanilla and R80.10 jumbo HFA take 42 which is what I have readily available in my lab.&amp;nbsp; But I am seeing the same problem you are with tcpdump crashing on R80.10 when you use the -Penni options.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taking a closer look at the tcpdump crash with &lt;A href="http://vault.centos.org/3.8/os/i386/RedHat/RPMS/strace-4.5.14-0.EL3.1.i386.rpm"&gt;strace&lt;/A&gt; in R80.10:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;recvfrom(8, "E\0\0004\37\272@\0\200\6VS\300\0\2\1\300\0\2\265. \0\26"..., 80, MSG_TRUNC, {sa_family=AF_PACKET, proto=0x800, if2, pkttype=PACKET_HOST, addr(6)={1, 005056c00001}, [18]) = 52&lt;BR /&gt;access("/proc/net", R_OK)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0&lt;BR /&gt;access("/proc/net/unix", R_OK)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0&lt;BR /&gt;socket(PF_FILE, SOCK_DGRAM, 0)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 9&lt;BR /&gt;ioctl(9, SIOCGIFNAME, {ifr_index=2, ifr_name="eth0"}) = 0&lt;BR /&gt;close(9)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0&lt;BR /&gt;open("/dev/tty", O_RDWR|O_NONBLOCK|O_NOCTTY) = 9&lt;BR /&gt;writev(9, [{"*** buffer overflow detected ***"..., 34}, {"tcpdump", 7}, {" terminated\n", 12}], 3) = 53&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though the reported tcpdump version number was not changed in R80.10, I'm guessing that Check Point must have ported in the tcpdump fixes mentioned here: &lt;A class="link-titled" href="https://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/" title="https://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/"&gt;Multiple Vulnerabilities in tcpdump - SANS Internet Storm Center&lt;/A&gt; and the fixes are running afoul of the interface determination mechanism used by tcpdump when -P is invoked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Curious thing is while the -P option (capitalized) is shown as a valid option by the tcpdump usage statement, it does not appear to be officially documented anywhere that I can find.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 24 Mar 2018 14:38:23 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2018-03-24T14:38:23Z</dc:date>
    <item>
      <title>TCPDUMP R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8177#M1010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can&amp;nbsp;someone explain me what happens to Penni?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Penni was my regular parameter set I used on R77.30 when I wanted to see the interface names in a tcpdump.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On R80.10 this is not working anymore:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[Expert@gateway:0]# tcpdump -Penni any port 22&lt;BR /&gt;tcpdump: WARNING: Promiscuous mode not supported on the "any" device&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on any, link-type LINUX_SLL (Linux cooked), capture size 96 bytes&lt;BR /&gt;*** buffer overflow detected ***: tcpdump terminated&lt;BR /&gt;======= Backtrace: =========&lt;BR /&gt;[cutted]&lt;BR /&gt;======= Memory map: ========&lt;BR /&gt;[cutted]&lt;BR /&gt;Aborted&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this a bug, a feature or layer-8 problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: I know fw monitor, but I only want to use it if necessary&amp;nbsp;&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/cool.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Mar 2018 10:42:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8177#M1010</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2018-03-24T10:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8178#M1011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Sven,&lt;/P&gt;&lt;P class=""&gt;I dont recall -Penni is an interface or sub-command to tcpdump.&lt;/P&gt;&lt;P class=""&gt;Shouldnt it be -i Penni??&lt;/P&gt;&lt;P class=""&gt;Like this:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"&gt;tcpdump -i Penni any port 22&lt;/SPAN&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto;"&gt;// Kim&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Mar 2018 10:49:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8178#M1011</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2018-03-24T10:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8179#M1012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reported version of tcpdump/libpcap did not change between R77.30 and R80.10 (3.9.4/0.9.4), at least between R77.30 vanilla and R80.10 jumbo HFA take 42 which is what I have readily available in my lab.&amp;nbsp; But I am seeing the same problem you are with tcpdump crashing on R80.10 when you use the -Penni options.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taking a closer look at the tcpdump crash with &lt;A href="http://vault.centos.org/3.8/os/i386/RedHat/RPMS/strace-4.5.14-0.EL3.1.i386.rpm"&gt;strace&lt;/A&gt; in R80.10:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;recvfrom(8, "E\0\0004\37\272@\0\200\6VS\300\0\2\1\300\0\2\265. \0\26"..., 80, MSG_TRUNC, {sa_family=AF_PACKET, proto=0x800, if2, pkttype=PACKET_HOST, addr(6)={1, 005056c00001}, [18]) = 52&lt;BR /&gt;access("/proc/net", R_OK)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0&lt;BR /&gt;access("/proc/net/unix", R_OK)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0&lt;BR /&gt;socket(PF_FILE, SOCK_DGRAM, 0)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 9&lt;BR /&gt;ioctl(9, SIOCGIFNAME, {ifr_index=2, ifr_name="eth0"}) = 0&lt;BR /&gt;close(9)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 0&lt;BR /&gt;open("/dev/tty", O_RDWR|O_NONBLOCK|O_NOCTTY) = 9&lt;BR /&gt;writev(9, [{"*** buffer overflow detected ***"..., 34}, {"tcpdump", 7}, {" terminated\n", 12}], 3) = 53&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though the reported tcpdump version number was not changed in R80.10, I'm guessing that Check Point must have ported in the tcpdump fixes mentioned here: &lt;A class="link-titled" href="https://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/" title="https://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/"&gt;Multiple Vulnerabilities in tcpdump - SANS Internet Storm Center&lt;/A&gt; and the fixes are running afoul of the interface determination mechanism used by tcpdump when -P is invoked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Curious thing is while the -P option (capitalized) is shown as a valid option by the tcpdump usage statement, it does not appear to be officially documented anywhere that I can find.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Mar 2018 14:38:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8179#M1012</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-03-24T14:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8180#M1013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Penni is the parameter set. The interface is any. The "-i" is already part of "Penni".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Mar 2018 17:18:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8180#M1013</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2018-03-25T17:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8181#M1014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your investigation.&lt;/P&gt;&lt;P&gt;With having this information it is worth to open an SR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will keep you posted!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Mar 2018 17:19:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8181#M1014</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2018-03-25T17:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8182#M1015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The response to my service reqest is a fix implemented in the lastest JHF ongoing take 151 released today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71191_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 09:56:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8182#M1015</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2018-10-04T09:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: TCPDUMP R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8183#M1016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This fix for tcpdump is also now available in a GA Jumbo HFA, take 154.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/10002"&gt;R80.10: New Jumbo Hotfix (Take 154) GA-Release&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:14:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCPDUMP-R80-10/m-p/8183#M1016</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-10-23T13:14:23Z</dc:date>
    </item>
  </channel>
</rss>

