1 / 15

The BSD Packet Filter: A New Architecture for User-level Packet Capture

The BSD Packet Filter: A New Architecture for User-level Packet Capture. Steven McCanne and Van Jacobson Lawrence Berkeley Laboratory Winter USENIX, December 19,1992. Introduction The BPF Network Tap The CSPF(Tree) Filter Model The BPF(CFG) Model The BPF Pseudo-Machine

kaz
Download Presentation

The BSD Packet Filter: A New Architecture for User-level Packet Capture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The BSD Packet Filter: A New Architecture for User-level Packet Capture Steven McCanne and Van Jacobson Lawrence Berkeley Laboratory Winter USENIX, December 19,1992 Shen Chuan-Hsing

  2. Introduction • The BPF Network Tap • The CSPF(Tree) Filter Model • The BPF(CFG) Model • The BPF Pseudo-Machine • Filter Performance Measurements • Conclusion Shen Chuan-Hsing

  3. Introduction • So What‘s A Packet Filter? • Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can be minimized by deploying a kernel agent called a packet filter, which discards unwanted packets as early as possible. • Why Would I Want to Packet Filter? • Control. Security. Watchfulness. Shen Chuan-Hsing

  4. The BPF Network Tap Shen Chuan-Hsing

  5. Shen Chuan-Hsing

  6. Shen Chuan-Hsing

  7. The CSPF(Tree) Filter Model Shen Chuan-Hsing

  8. The BPF(CFG) Model Shen Chuan-Hsing

  9. The BPF Pseudo-Machine • This filter accepts all IP packets • ldh [12] • jeq #ETHERTYPE_IP, L1, L2 • L1: ret #TRUE • L2: ret #0 Shen Chuan-Hsing

  10. The BPF Pseudo-Machine (cont.) • This filter accepts all IP packets, beside 128.3.112 or 128.3.254. • ldh [12] • jeq #ETHERTYPE_IP, L1, L4 • L1: ld [26] • and #0xffffff00 • jeq #0x80037000, L4, L2 • L2: jeq #0x8003fe00, L4, L3 • L3: ret #TRUE • L4: ret #0 Shen Chuan-Hsing

  11. Shen Chuan-Hsing

  12. Shen Chuan-Hsing

  13. Shen Chuan-Hsing

  14. Filter Performance Measurements Shen Chuan-Hsing

  15. Conclusion • Tcpdump: filter translation, packet acquisition, and packet display Shen Chuan-Hsing

More Related