Joel L. Breazeale on Mon, 26 May 2003 13:00:19 -0400 |
Michael, The address 24.163.210.43 is my LinkSys BEFXS41 router/firewall. I've opened it up as much as can for this exercise (perhaps something can still be opened up). For your information, here's the output of tcptraceroute 1.4 on RH 7.3 from my workplace to my home computer: # tcptraceroute 24.163.210.43 Selected device eth0, address 10.1.3.55, port 59596 for outgoing packets Tracing the path to 24.163.210.43 on TCP port 80, 30 hops max 1 10.1.0.1 (10.1.0.1) 2.421 ms 1.192 ms 1.182 ms 2 12.33.166.1 (12.33.166.1) 10.045 ms 2.697 ms 2.659 ms 3 12.125.171.113 (12.125.171.113) 4.121 ms 4.171 ms 4.182 ms 4 gbr2-p24.cgcil.ip.att.net (12.123.204.6) 17.711 ms 18.789 ms 14.336 ms 5 tbr2-p013602.cgcil.ip.att.net (12.122.11.53) 13.776 ms 13.718 ms 13.926 ms 6 ggr2-p390.cgcil.ip.att.net (12.123.6.37) 13.790 ms 14.677 ms 14.313 ms 7 att-gw.chi.aol.com (192.205.32.238) 14.683 ms 22.866 ms 14.669 ms 8 rr-min.atdn.net (66.185.141.102) 33.592 ms 38.862 ms 33.687 ms 9 srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4) 34.834 ms 34.719 ms 34.501 ms 10 mogwai (24.163.210.43) [open] 46.211 ms 44.050 ms * # The output you wanted follows. --Joel ======start====== [mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# ./tcptraceroute -q1 -d 127.0.0.1 debug: tcptraceroute 1.5beta2 debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100) debug: entering getinterfaces() debug: ifreq buffer set to 32 debug: Successfully retrieved interface list debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses. debug: Discovered interface lo0 with address 24.3.0.0 debug: Ignoring AF_INET6 address on interface lo0 debug: Ignoring AF_INET6 address on interface lo0 debug: Discovered interface lo0 with address 127.0.0.1 debug: Ignoring down interface gif0 debug: Ignoring down interface stf0 debug: Discovered interface en0 with address 6.3.6.0 debug: Ignoring AF_INET6 address on interface en0 debug: Discovered interface en0 with address 192.168.1.200 debug: Discovered interface ppp0 with address 23.4.0.0 debug: Discovered interface ppp0 with address 10.1.9.2 debug: leaving getinterfaces() debug: Determined source address of 127.0.0.1 to reach 127.0.0.1 debug: entering finddev() debug: Destination matches local address of interface lo0; attempting to find loopback interface, o_nofilter set debug: finddev() returning lo0 debug: Setting o_syn, in absence of either o_syn or o_ack debug: debugoptions(): debug: TEXTSIZE: 1024 SNAPLEN: 92 IPTOSBUFFERS: 12 debug: ALLOCATEID_CACHE: 512 datalink: 0 datalinkoffset: 4 debug: o_minttl: 1 o_maxttl: 30 o_timeout: 3 debug: o_debug: 1 o_numeric: 0 o_pktlen: 0 debug: o_nqueries: 1 o_dontfrag: 0 o_tos: 0 debug: o_forceport: 0 o_syn: 1 o_ack: 0 debug: o_ecn: 0 o_nofilter: 1 o_nogetinterfaces: 0 debug: o_trackport: 0 datalinkname: DLT_NULL device: lo0 debug: o_noselect: 1 Selected device lo0, address 127.0.0.1, port 49234 for outgoing packets debug: pcap filter is: (nothing) Tracing the path to 127.0.0.1 on TCP port 80 (http), 30 hops max debug: Initializing packet buffer of 40 bytes debug: Generating a new batch of 512 IP ID's debug: Sent probe 1 of 1 for hop 1, IP ID 38627, source port 49234, SYN debug: received 40 byte IP packet from pcap_next() debug: Received tcp packet 127.0.0.1:49234 -> 127.0.0.1:80, flags SYN debug: tcp packet doesn't contain the correct port numbers debug: received 44 byte IP packet from pcap_next() debug: Received tcp packet 127.0.0.1:80 -> 127.0.0.1:49234, flags SYN ACK debug: displayed hop 1 localhost (127.0.0.1) [open] 0.369 ms [mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# ./tcptraceroute -q1 -d 24.163.210.43 debug: tcptraceroute 1.5beta2 debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100) debug: entering getinterfaces() debug: ifreq buffer set to 32 debug: Successfully retrieved interface list debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses. debug: Discovered interface lo0 with address 24.3.0.0 debug: Ignoring AF_INET6 address on interface lo0 debug: Ignoring AF_INET6 address on interface lo0 debug: Discovered interface lo0 with address 127.0.0.1 debug: Ignoring down interface gif0 debug: Ignoring down interface stf0 debug: Discovered interface en0 with address 6.3.6.0 debug: Ignoring AF_INET6 address on interface en0 debug: Discovered interface en0 with address 192.168.1.200 debug: Discovered interface ppp0 with address 23.4.0.0 debug: Discovered interface ppp0 with address 10.1.9.2 debug: leaving getinterfaces() debug: Determined source address of 192.168.1.200 to reach 24.163.210.43 debug: entering finddev() debug: finddev() returning en0 debug: Setting o_syn, in absence of either o_syn or o_ack debug: debugoptions(): debug: TEXTSIZE: 1024 SNAPLEN: 92 IPTOSBUFFERS: 12 debug: ALLOCATEID_CACHE: 512 datalink: 1 datalinkoffset: 14 debug: o_minttl: 1 o_maxttl: 30 o_timeout: 3 debug: o_debug: 1 o_numeric: 0 o_pktlen: 0 debug: o_nqueries: 1 o_dontfrag: 0 o_tos: 0 debug: o_forceport: 0 o_syn: 1 o_ack: 0 debug: o_ecn: 0 o_nofilter: 0 o_nogetinterfaces: 0 debug: o_trackport: 0 datalinkname: ETHERNET device: en0 debug: o_noselect: 1 Selected device en0, address 192.168.1.200, port 49235 for outgoing packets debug: pcap filter is: (tcp and src host 24.163.210.43 and src port 80 and dst host 192.168.1.200) or ((icmp[0] == 11 or icmp[0] == 3) and dst host 192.168.1.200) Tracing the path to 24.163.210.43 on TCP port 80 (http), 30 hops max debug: Initializing packet buffer of 40 bytes debug: Generating a new batch of 512 IP ID's debug: Sent probe 1 of 1 for hop 1, IP ID 24996, source port 49235, SYN debug: received 50 byte IP packet from pcap_next() debug: Received tcp packet 24.163.210.43:80 -> 192.168.1.200:49235, flags SYN ACK debug: displayed hop 1 cpe-24-163-210-43.mn.rr.com (24.163.210.43) [open] 1.317 ms [mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# ./tcptraceroute -q3 -f30 -d toren.net debug: tcptraceroute 1.5beta2 debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100) debug: entering getinterfaces() debug: ifreq buffer set to 32 debug: Successfully retrieved interface list debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses. debug: Discovered interface lo0 with address 24.3.0.0 debug: Ignoring AF_INET6 address on interface lo0 debug: Ignoring AF_INET6 address on interface lo0 debug: Discovered interface lo0 with address 127.0.0.1 debug: Ignoring down interface gif0 debug: Ignoring down interface stf0 debug: Discovered interface en0 with address 6.3.6.0 debug: Ignoring AF_INET6 address on interface en0 debug: Discovered interface en0 with address 192.168.1.200 debug: Discovered interface ppp0 with address 23.4.0.0 debug: Discovered interface ppp0 with address 10.1.9.2 debug: leaving getinterfaces() debug: Determined source address of 192.168.1.200 to reach 207.8.132.197 debug: entering finddev() debug: finddev() returning en0 debug: Setting o_syn, in absence of either o_syn or o_ack debug: debugoptions(): debug: TEXTSIZE: 1024 SNAPLEN: 92 IPTOSBUFFERS: 12 debug: ALLOCATEID_CACHE: 512 datalink: 1 datalinkoffset: 14 debug: o_minttl: 30 o_maxttl: 30 o_timeout: 3 debug: o_debug: 1 o_numeric: 0 o_pktlen: 0 debug: o_nqueries: 3 o_dontfrag: 0 o_tos: 0 debug: o_forceport: 0 o_syn: 1 o_ack: 0 debug: o_ecn: 0 o_nofilter: 0 o_nogetinterfaces: 0 debug: o_trackport: 0 datalinkname: ETHERNET device: en0 debug: o_noselect: 1 Selected device en0, address 192.168.1.200, port 49236 for outgoing packets debug: pcap filter is: (tcp and src host 207.8.132.197 and src port 80 and dst host 192.168.1.200) or ((icmp[0] == 11 or icmp[0] == 3) and dst host 192.168.1.200) Tracing the path to toren.net (207.8.132.197) on TCP port 80 (http), 30 hops max debug: Initializing packet buffer of 40 bytes debug: Generating a new batch of 512 IP ID's debug: Sent probe 1 of 3 for hop 30, IP ID 52323, source port 49236, SYN debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: received 50 byte IP packet from pcap_next() debug: Received tcp packet 207.8.132.197:80 -> 192.168.1.200:49236, flags SYN ACK debug: displayed hop 30 www.toren.net (207.8.132.197) [open] 64.092 ms debug: Sent probe 2 of 3 for hop 30, IP ID 54070, source port 49236, SYN debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: received 50 byte IP packet from pcap_next() debug: Received tcp packet 207.8.132.197:80 -> 192.168.1.200:49236, flags SYN ACK debug: displayed hop 61.025 ms debug: Sent probe 3 of 3 for hop 30, IP ID 18279, source port 49236, SYN debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: null pointer from pcap_next() debug: received 50 byte IP packet from pcap_next() debug: Received tcp packet 207.8.132.197:80 -> 192.168.1.200:49236, flags SYN ACK debug: displayed hop 61.198 ms [mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# traceroute toren.net traceroute to toren.net (207.8.132.197), 30 hops max, 40 byte packets 1 * * * 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * * 10 * * * 11 * * * 12 * * * 13 * * * 14 * * * 15 * * * 16 * * * 17 * * * 18 * * * 19 * * * 20 * * * 21 * * * 22 * * * 23 * * * 24 * * * 25 * * * 26 * * * 27 * * * 28 * * * 29 * * * 30 * * * [mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# telnet toren.net 4242 Trying 207.8.132.197... Connected to www.toren.net. Escape character is '^]'. Hello, Joel ^] telnet> quit Connection closed. [mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# ======end====== > > I used --no-select and found better results for 127.0.0.1 and 24.163.210.43. > > Side-by-side results follow: > [..] > > $ sudo ./tcptraceroute --no-select 127.0.0.1 > > Selected device lo0, address 127.0.0.1, port 49518 for outgoing packets > > Tracing the path to 127.0.0.1 on TCP port 80 (http), 30 hops max > > 1 localhost (127.0.0.1) [open] 0.333 ms 0.244 ms 0.186 ms > > Okay, so it looks like --no-select should be the default on MacOS X. > Based on the output of "gcc -E -dM - </dev/null" on your machine, it > would seem that we can detect MacOS X systems by checking for the > presence of __APPLE__ and __MACH__. I just patched the configure.ac > file so that autoconf should now do just that, and make --no-select the > compile-time default for MacOS X. Can you please confirm that it's no > longer necessary to specify the --no-select command line argument by > hand with tcptraceroute-1.5beta2? > > <http://michael.toren.net/code/tcptraceroute/tcptraceroute-1.5beta2.tar.gz> > > > Here's the non-local case too w/ and w/o --no-select: > [..] > > $ sudo ./tcptraceroute --no-select 66.135.192.87 > > Selected device en0, address 192.168.1.200, port 49529 for outgoing packets > > Tracing the path to 66.135.192.87 on TCP port 80 (http), 30 hops max > > 1 * * * > > ^C > > Hmm. Earlier you included a traceroute to 24.163.210.43, which was one > hop away. Is that the address of your local machine, or the address of > a NAT device external to your MacOS X system? If it's an external NAT > device, I wonder if it could be interfering with tcptraceroute. Can you > please try executing the following commands, and sending back the output > from each? > > tcptraceroute -q1 -d 127.0.0.1 > tcptraceroute -q1 -d 24.163.210.43 > tcptraceroute -q3 -f30 -d toren.net > traceroute toren.net > telnet toren.net 4242 > > Thanks, > -mct > _______________________________________________ > tcptraceroute-dev mailing list > tcptraceroute-dev@netisland.net > https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev > _______________________________________________ tcptraceroute-dev mailing list tcptraceroute-dev@netisland.net https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev
|
|