Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A bug in Package Sniffing and Spoofing Lab #82

Open
Jacob953 opened this issue Nov 14, 2021 · 1 comment
Open

A bug in Package Sniffing and Spoofing Lab #82

Jacob953 opened this issue Nov 14, 2021 · 1 comment

Comments

@Jacob953
Copy link
Contributor

Describe the bug
It's unable to change PROMISC model sometimes.
cat /sys/class/net/br-xxx/flags should be used to check PROMISC model rather than ifconfig, since command ifconfig cannot accurately feedback the status of PROMISC model.
By the way, 0x1003 means down, 0x1103 means the opposite.

Expected behavior
I found it easy to resolve this problem by rebuilding containers. But I'm curious about the reason why it went wrong.

Screenshots
image

@kevin-w-du
Copy link
Member

This is an interesting issue, and I will look into this. The promiscuous mode in docker's network interface card has quite different behaviors than that on a physical NIC, because the underlying implementation uses Linux bridge, which is a smart bridge (i.e., it remembers the MAC addresses). Thanks for reporting the problem.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants