|
Packit |
209cc3 |
Guidelines for contributing
|
|
Packit |
209cc3 |
===========================
|
|
Packit |
209cc3 |
|
|
Packit |
209cc3 |
To report a security issue (segfault, buffer overflow, infinite loop, arbitrary
|
|
Packit |
209cc3 |
code execution etc) please send an e-mail to security@tcpdump.org, do not use
|
|
Packit |
209cc3 |
the bug tracker!
|
|
Packit |
209cc3 |
|
|
Packit |
209cc3 |
To report a non-security problem (failure to compile, failure to capture packets
|
|
Packit |
209cc3 |
properly, missing support for a network interface type or DLT) please check
|
|
Packit |
209cc3 |
first that it reproduces with the latest stable release of libpcap. If it does,
|
|
Packit |
209cc3 |
please check that the problem reproduces with the current git master branch of
|
|
Packit |
209cc3 |
libpcap. If it does (and it is not a security-related problem, otherwise see
|
|
Packit |
209cc3 |
above), please navigate to https://github.com/the-tcpdump-group/libpcap/issues
|
|
Packit |
209cc3 |
and check if the problem has already been reported. If it has not, please open
|
|
Packit |
209cc3 |
a new issue and provide the following details:
|
|
Packit |
209cc3 |
|
|
Packit |
209cc3 |
* libpcap version (e.g. from tcpdump --version)
|
|
Packit |
209cc3 |
* operating system name and version and any other details that may be relevant
|
|
Packit |
209cc3 |
(uname -a, compiler name and version, CPU type etc.)
|
|
Packit |
209cc3 |
* configure flags if any were used
|
|
Packit |
209cc3 |
* statement of the problem
|
|
Packit |
209cc3 |
* steps to reproduce
|
|
Packit |
209cc3 |
|
|
Packit |
209cc3 |
Please note that if you know exactly how to solve the problem and the solution
|
|
Packit |
209cc3 |
would not be too intrusive, it would be best to contribute some development time
|
|
Packit |
209cc3 |
and open a pull request instead.
|
|
Packit |
209cc3 |
|
|
Packit |
209cc3 |
Still not sure how to do? Feel free to [subscribe](https://www.tcpdump.org/#mailing-lists)
|
|
Packit |
209cc3 |
to the mailing list tcpdump-workers@lists.tcpdump.org and ask!
|