<div dir="ltr"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><br>Well, you could write to named pipe and read it on the other side of that pipe, alternatively you can use socat and write to the UNIX socket. This will allow you to run tcpdump as a privileged user without making Erlang running as one.<br>
<br></blockquote><div><br></div>To make a direct pipe, I'm getting from 'tcpdump' and 'replay' on the other side like below:<br><br></div><div class="gmail_quote"># tcdump -i eth0 -w -'..... | tcpreplay -i eth1 - ....<br><br></div><div class="gmail_quote">But with this, the traffic is just replayed and I watch passively.<br><br>When you say 'read it on the other side', are you talking about piping to Erlang? If yes, How to do that please? </div><div class="gmail_quote">.</div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">You can however "hack it around" by using CAP_NET_RAW (if you run on Linux), either manually or via init system of your choice (ex. in systemd <a href="https://www.freedesktop.org/software/systemd/man/systemd.exec.html#Capabilities" rel="noreferrer" target="_blank">https://www.freedesktop.org/software/systemd/man/systemd.exec.html#Capabilities</a>).<br>
<br>
</blockquote><div><br></div> *CAP_NET_RAW<br><div> *systemd *<a href="https://www.freedesktop.org/software/systemd/man/systemd.exec.html#Capabilities">https://www.freedesktop.org/software/systemd/man/systemd.exec.html#Capabilities</a></div><div>Really appreciated, I will check them.</div><div><br></div></div></div>