Gisle Vanem
2004-05-19 12:30:07 UTC
How do I sniff the unencrypted traffic leaving/arriving at the
tap device under Win-XP?
'OpenVPN tap' {C092B038-B7E7-4D0D-A6A9-BC45D62835D7}
But tcpdump -D shows only my real eth-adapter (2) and my IPv6
pseudo interface (1):
1: \Device\NPF_{7F56352E-EF2F-49F4-844C-BA1FA0105667}
2: \Device\NPF_{93380695-0E31-456C-9EB0-8802E111C09D}
Is it possible at all?
BTW. I've created a MAC bridge connecting the tap and the
physical adapter. This caused my IP to change (fair enough),
but it also generates a lot of Spanning Tree traffic; approx 1
message each second. Does OpenVPN needs this in any way,
or can I turn it off somehow?
--gv
tap device under Win-XP?
openvpn --show-adapters
Available TAP-WIN32 adapters [name, GUID]:'OpenVPN tap' {C092B038-B7E7-4D0D-A6A9-BC45D62835D7}
But tcpdump -D shows only my real eth-adapter (2) and my IPv6
pseudo interface (1):
1: \Device\NPF_{7F56352E-EF2F-49F4-844C-BA1FA0105667}
2: \Device\NPF_{93380695-0E31-456C-9EB0-8802E111C09D}
Is it possible at all?
BTW. I've created a MAC bridge connecting the tap and the
physical adapter. This caused my IP to change (fair enough),
but it also generates a lot of Spanning Tree traffic; approx 1
message each second. Does OpenVPN needs this in any way,
or can I turn it off somehow?
--gv