Mario Fetka c0e8d8ccb4
All checks were successful
Source release / source-package (push) Successful in 52s
prepare autotools source release workflow
2026-04-29 20:47:23 +02:00
2026-04-29 19:58:43 +02:00
2020-05-31 00:09:21 +03:00
2026-04-29 19:58:43 +02:00
2026-04-29 19:58:43 +02:00
2020-05-31 00:09:21 +03:00
2020-05-31 00:09:21 +03:00
2020-05-31 00:09:21 +03:00
2026-04-29 19:58:43 +02:00
2026-04-29 19:58:43 +02:00
2026-04-29 19:58:43 +02:00
2026-04-29 19:58:43 +02:00
2020-05-29 23:38:57 +03:00
2026-04-29 19:58:43 +02:00
2026-04-29 19:58:43 +02:00
2026-04-29 19:58:43 +02:00
2020-05-31 00:09:21 +03:00

This file contains a very short introduction to the IPX implementation
on Linux.  Feel free to forward comments (especially suggested additions)
to greg@caldera.com.

--------------------------------------8<--------------------------------------
Since this mail address isn't valid anymore (2002-03-10), I took care of this
package myself and enhanced this to compile under recent kernel versions and
systems. Feel free to write me: poc@pocnet.net.
--------------------------------------8<--------------------------------------

The following are important definitions in understanding the descriptions
in this README file.

IPX Interface - This is the item to which IPX sockets are bound.
An IPX interface corresponds to an IPX Network Number which corresponds 
to a physical device and frame type.  A sample IPX Interface would be:
Network Number: 0x00ABCDEF
Device: Eth0 
Frame Type: 802.2.
The particular interface is selected during binding by using the
Network Number (see sample code below).

Primary Interface - The interface that is selected by default when
binding a socket.  This is selected when binding by using
a network number of 0 (see sample code below).

Internal Network - This is a special kind of IPX interface that does
not have a physical device or frame type.  It is used to provide
a route-independent address for service providers.   Internal network
numbers are optional; however, when one is present it is also the
Primary Interface.

This tar file contains the following IPX utilities:

ipx_interface.c
This program is used to create an IPX interface.  

ipx_internal_net.c
This program is used to create an IPX Internal Network number.  

ipx_route.c
This program creates an IPX route.

ipx_configure.c
This program is used to read/write two configuration parameters:
	AUTO INTERFACE CREATE - IPX should/shouldn't automatically create
		an IPX interface when it discovers one that has not been
		registered via ipx_interface above.
	AUTO PRIMARY SELECT - IPX should/shouldn't automatically select
		a primary interface when it one an interface exists and
		none are designated as the primary.  Manual designation
		is performed via ipx_interface.

By default, these are both turned off.
				
The following are sample IPX programs (found in directory Samples):

ipxrcv.c and ipxsend.c 
ipxsend will send a single packet to an instance of ipxrcv running on the 
same machine.  It uses getsockname(2) to determine the address to which to 
send the packet.  
rip.c
rip passively monitors the rip traffic on the attached IPX network.
sap.c
sap passively monitors the sap traffic on the attached IPX network.

There are three files in /proc/net/ipx that relate to IPX:
interface	contains the list of IPX interfaces.
route		contains the list of IPX routes.
socket		the list of IPX sockets in use.
This is a VERY stupid packet sniffer for IPX ethernet packets.

 =============================================
 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
 ! ! !  S E C U R I T Y   W A R N I N G  ! ! !
 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !
 =============================================

If you are using unencrypted passwords, and use this tool to send a
dump to somebody else or store it on a computer, you might very well
store passwords there. So, be VERY careful! This is exactly the kind
of tools Novell designed the encrypted passwords for (or against).



I hacked it together to be able to help people with problems with
ncpfs. The socket handling was taken from Statnet-2.0.

You can use it to watch commercial NetWare clients when they talk to
servers. I divided the program into 2 parts, ipxdump and ipxparse.

ipxdump simply pumps all the IPX frames it receives to stdout.

If you use ipxdump to watch a workstation, you can use the simple
filter function ipxdump provides. You can call ipxdump with the node
address of the workstation you want to watch. This way only the
packets this workstation sends and receives are monitored. As an
example, I call ipxdump as

  ./ipxdump 00001B038B11

to look at my 286/10MHz test 'workstation'. ipxdump still generates
huge amounts of data, so you should be very careful to start it just
before you perform the operation (such as file creation for OS/2
clients with NW4.1 as a server, or a 'dir' on a directory with long
and short file names, or an encrypted password change ;-)) and stop it
directly after that. And, please gzip -9 and uuencode it before you
send it to anybody.

ipxparse will eventually take apart the dump that ipxdump
generates. They can as well be used in a pipe. Currently ipxparse does
not do anything sensible, but that will definitely change.

Volker Lendecke
<lendecke@namu01.gwdg.de>
Description
IPX userspace utilities for Linux
Readme 2.1 MiB
v1.4 Latest
2026-05-06 11:21:34 +02:00
Languages
C 37%
M4 23.3%
Makefile 22.5%
Shell 14.6%
Roff 2.5%