NAME
Sniffer::Connection - contain basic information about a TCP connection
SYNOPSIS
my $conn = Sniffer::Connection->new(
tcp => $packet,
sent_data => sub { $self->sent_data(@_) },
received_data => sub { $self->received_data(@_) },
closed => sub {},
teardown => sub { $self->closed->($self) },
log => sub { print $_[0] },
));
This module will try to give you the ordered data stream from a TCP connection. You supply callbacks for the data. The data is returned as the ACK-packets are seen for it.
As the TCP-reordering is cooked out by me, it likely has bugs, but I have used this module for sniffing some out-of-order TCP connection.
$conn->init_from_packet TCP>>
Initializes the connection data from a packet.
$conn->handle_packet TCP>>
Handles a packet and updates the status according to the packet.
TODO
Implement a (configurable?) timeout (of say 5 minutes) after which connections get auto-closed to reduce resource usage.
Data can only be forwarded after there has been the ACK packet for it!
BUGS
The whole module suite has almost no tests.
If you experience problems, please supply me with a complete, relevant packet dump as the included dump-raw.pl
creates. Even better, supply me with (failing) tests.
AUTHOR
Max Maischein (corion@cpan.org)
COPYRIGHT
Copyright (C) 2005 Max Maischein. All Rights Reserved.
This code is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
3 POD Errors
The following errors were encountered while parsing the POD:
- Around line 62:
Unterminated C< ... > sequence
- Around line 74:
Unterminated C< ... > sequence
- Around line 216:
You forgot a '=back' before '=head1'