Joel L. Breazeale on Mon, 26 May 2003 13:00:19 -0400


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [tcptra-dev] tcptraceroute-1.5beta2 (was Re: [tcptra-dev] tcptraceroute-1.5beta1)


Michael,

The address 24.163.210.43 is my LinkSys BEFXS41 router/firewall.  I've opened
it up as much as can for this exercise (perhaps something can still be opened
up).  For your information, here's the output of tcptraceroute 1.4 on RH 7.3
from my workplace to my home computer:

    # tcptraceroute 24.163.210.43
    Selected device eth0, address 10.1.3.55, port 59596 for outgoing packets
    Tracing the path to 24.163.210.43 on TCP port 80, 30 hops max
     1  10.1.0.1 (10.1.0.1)  2.421 ms  1.192 ms  1.182 ms
     2  12.33.166.1 (12.33.166.1)  10.045 ms  2.697 ms  2.659 ms
     3  12.125.171.113 (12.125.171.113)  4.121 ms  4.171 ms  4.182 ms
     4  gbr2-p24.cgcil.ip.att.net (12.123.204.6)  17.711 ms  18.789 ms  14.336 ms
     5  tbr2-p013602.cgcil.ip.att.net (12.122.11.53)  13.776 ms  13.718 ms  13.926 ms
     6  ggr2-p390.cgcil.ip.att.net (12.123.6.37)  13.790 ms  14.677 ms  14.313 ms
     7  att-gw.chi.aol.com (192.205.32.238)  14.683 ms  22.866 ms  14.669 ms
     8  rr-min.atdn.net (66.185.141.102)  33.592 ms  38.862 ms  33.687 ms
     9  srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4)  34.834 ms  34.719 ms  34.501 ms
    10  mogwai (24.163.210.43) [open]  46.211 ms  44.050 ms *
    # 

The output you wanted follows.

--Joel

======start======
[mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# ./tcptraceroute -q1 -d 127.0.0.1
debug: tcptraceroute 1.5beta2
debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100)
debug: entering getinterfaces()
debug: ifreq buffer set to 32
debug: Successfully retrieved interface list
debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses.
debug: Discovered interface lo0 with address 24.3.0.0
debug: Ignoring AF_INET6 address on interface lo0
debug: Ignoring AF_INET6 address on interface lo0
debug: Discovered interface lo0 with address 127.0.0.1
debug: Ignoring down interface gif0
debug: Ignoring down interface stf0
debug: Discovered interface en0 with address 6.3.6.0
debug: Ignoring AF_INET6 address on interface en0
debug: Discovered interface en0 with address 192.168.1.200
debug: Discovered interface ppp0 with address 23.4.0.0
debug: Discovered interface ppp0 with address 10.1.9.2
debug: leaving getinterfaces()
debug: Determined source address of 127.0.0.1 to reach 127.0.0.1
debug: entering finddev()
debug: Destination matches local address of interface lo0;
        attempting to find loopback interface, o_nofilter set
debug: finddev() returning lo0
debug: Setting o_syn, in absence of either o_syn or o_ack
debug: debugoptions():
debug:         TEXTSIZE: 1024        SNAPLEN: 92     IPTOSBUFFERS: 12
debug: ALLOCATEID_CACHE: 512         datalink: 0    datalinkoffset: 4 
debug:         o_minttl: 1          o_maxttl: 30        o_timeout: 3 
debug:          o_debug: 1         o_numeric: 0          o_pktlen: 0 
debug:       o_nqueries: 1        o_dontfrag: 0             o_tos: 0 
debug:      o_forceport: 0             o_syn: 1             o_ack: 0 
debug:            o_ecn: 0        o_nofilter: 1 o_nogetinterfaces: 0 
debug:      o_trackport: 0      datalinkname: DLT_NULL     device: lo0
debug:       o_noselect: 1 
Selected device lo0, address 127.0.0.1, port 49234 for outgoing packets
debug: pcap filter is: (nothing)
Tracing the path to 127.0.0.1 on TCP port 80 (http), 30 hops max
debug: Initializing packet buffer of 40 bytes
debug: Generating a new batch of 512 IP ID's
debug: Sent probe 1 of 1 for hop 1, IP ID 38627, source port 49234, SYN 
debug: received 40 byte IP packet from pcap_next()
debug: Received tcp packet 127.0.0.1:49234 -> 127.0.0.1:80, flags SYN 
debug: tcp packet doesn't contain the correct port numbers
debug: received 44 byte IP packet from pcap_next()
debug: Received tcp packet 127.0.0.1:80 -> 127.0.0.1:49234, flags SYN ACK 
debug: displayed hop
 1  localhost (127.0.0.1) [open]  0.369 ms

[mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# ./tcptraceroute -q1 -d 24.163.210.43
debug: tcptraceroute 1.5beta2
debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100)
debug: entering getinterfaces()
debug: ifreq buffer set to 32
debug: Successfully retrieved interface list
debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses.
debug: Discovered interface lo0 with address 24.3.0.0
debug: Ignoring AF_INET6 address on interface lo0
debug: Ignoring AF_INET6 address on interface lo0
debug: Discovered interface lo0 with address 127.0.0.1
debug: Ignoring down interface gif0
debug: Ignoring down interface stf0
debug: Discovered interface en0 with address 6.3.6.0
debug: Ignoring AF_INET6 address on interface en0
debug: Discovered interface en0 with address 192.168.1.200
debug: Discovered interface ppp0 with address 23.4.0.0
debug: Discovered interface ppp0 with address 10.1.9.2
debug: leaving getinterfaces()
debug: Determined source address of 192.168.1.200 to reach 24.163.210.43
debug: entering finddev()
debug: finddev() returning en0
debug: Setting o_syn, in absence of either o_syn or o_ack
debug: debugoptions():
debug:         TEXTSIZE: 1024        SNAPLEN: 92     IPTOSBUFFERS: 12
debug: ALLOCATEID_CACHE: 512         datalink: 1    datalinkoffset: 14
debug:         o_minttl: 1          o_maxttl: 30        o_timeout: 3 
debug:          o_debug: 1         o_numeric: 0          o_pktlen: 0 
debug:       o_nqueries: 1        o_dontfrag: 0             o_tos: 0 
debug:      o_forceport: 0             o_syn: 1             o_ack: 0 
debug:            o_ecn: 0        o_nofilter: 0 o_nogetinterfaces: 0 
debug:      o_trackport: 0      datalinkname: ETHERNET     device: en0
debug:       o_noselect: 1 
Selected device en0, address 192.168.1.200, port 49235 for outgoing packets
debug: pcap filter is: 
                (tcp and src host 24.163.210.43 and src port 80 and dst host 192.168.1.200)
                or ((icmp[0] == 11 or icmp[0] == 3) and dst host 192.168.1.200)
Tracing the path to 24.163.210.43 on TCP port 80 (http), 30 hops max
debug: Initializing packet buffer of 40 bytes
debug: Generating a new batch of 512 IP ID's
debug: Sent probe 1 of 1 for hop 1, IP ID 24996, source port 49235, SYN 
debug: received 50 byte IP packet from pcap_next()
debug: Received tcp packet 24.163.210.43:80 -> 192.168.1.200:49235, flags SYN ACK 
debug: displayed hop
 1  cpe-24-163-210-43.mn.rr.com (24.163.210.43) [open]  1.317 ms

[mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# ./tcptraceroute -q3 -f30 -d toren.net
debug: tcptraceroute 1.5beta2
debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100)
debug: entering getinterfaces()
debug: ifreq buffer set to 32
debug: Successfully retrieved interface list
debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses.
debug: Discovered interface lo0 with address 24.3.0.0
debug: Ignoring AF_INET6 address on interface lo0
debug: Ignoring AF_INET6 address on interface lo0
debug: Discovered interface lo0 with address 127.0.0.1
debug: Ignoring down interface gif0
debug: Ignoring down interface stf0
debug: Discovered interface en0 with address 6.3.6.0
debug: Ignoring AF_INET6 address on interface en0
debug: Discovered interface en0 with address 192.168.1.200
debug: Discovered interface ppp0 with address 23.4.0.0
debug: Discovered interface ppp0 with address 10.1.9.2
debug: leaving getinterfaces()
debug: Determined source address of 192.168.1.200 to reach 207.8.132.197
debug: entering finddev()
debug: finddev() returning en0
debug: Setting o_syn, in absence of either o_syn or o_ack
debug: debugoptions():
debug:         TEXTSIZE: 1024        SNAPLEN: 92     IPTOSBUFFERS: 12
debug: ALLOCATEID_CACHE: 512         datalink: 1    datalinkoffset: 14
debug:         o_minttl: 30         o_maxttl: 30        o_timeout: 3 
debug:          o_debug: 1         o_numeric: 0          o_pktlen: 0 
debug:       o_nqueries: 3        o_dontfrag: 0             o_tos: 0 
debug:      o_forceport: 0             o_syn: 1             o_ack: 0 
debug:            o_ecn: 0        o_nofilter: 0 o_nogetinterfaces: 0 
debug:      o_trackport: 0      datalinkname: ETHERNET     device: en0
debug:       o_noselect: 1 
Selected device en0, address 192.168.1.200, port 49236 for outgoing packets
debug: pcap filter is: 
                (tcp and src host 207.8.132.197 and src port 80 and dst host 192.168.1.200)
                or ((icmp[0] == 11 or icmp[0] == 3) and dst host 192.168.1.200)
Tracing the path to toren.net (207.8.132.197) on TCP port 80 (http), 30 hops max
debug: Initializing packet buffer of 40 bytes
debug: Generating a new batch of 512 IP ID's
debug: Sent probe 1 of 3 for hop 30, IP ID 52323, source port 49236, SYN 
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: received 50 byte IP packet from pcap_next()
debug: Received tcp packet 207.8.132.197:80 -> 192.168.1.200:49236, flags SYN ACK 
debug: displayed hop
30  www.toren.net (207.8.132.197) [open]  64.092 ms

debug: Sent probe 2 of 3 for hop 30, IP ID 54070, source port 49236, SYN 
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: received 50 byte IP packet from pcap_next()
debug: Received tcp packet 207.8.132.197:80 -> 192.168.1.200:49236, flags SYN ACK 
debug: displayed hop
  61.025 ms

debug: Sent probe 3 of 3 for hop 30, IP ID 18279, source port 49236, SYN 
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: null pointer from pcap_next()
debug: received 50 byte IP packet from pcap_next()
debug: Received tcp packet 207.8.132.197:80 -> 192.168.1.200:49236, flags SYN ACK 
debug: displayed hop
  61.198 ms

[mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# traceroute toren.net
traceroute to toren.net (207.8.132.197), 30 hops max, 40 byte packets
 1  * * *
 2  * * *
 3  * * *
 4  * * *
 5  * * *
 6  * * *
 7  * * *
 8  * * *
 9  * * *
10  * * *
11  * * *
12  * * *
13  * * *
14  * * *
15  * * *
16  * * *
17  * * *
18  * * *
19  * * *
20  * * *
21  * * *
22  * * *
23  * * *
24  * * *
25  * * *
26  * * *
27  * * *
28  * * *
29  * * *
30  * * *
[mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# telnet toren.net 4242
Trying 207.8.132.197...
Connected to www.toren.net.
Escape character is '^]'.
Hello, Joel
^]
telnet> quit
Connection closed.
[mogwai:jbreazea/Desktop/tcptraceroute-1.5beta2] jbreazea# 
======end======

> > I used --no-select and found better results for 127.0.0.1 and 24.163.210.43.
> > Side-by-side results follow:
> [..]
> >     $ sudo ./tcptraceroute --no-select 127.0.0.1
> >     Selected device lo0, address 127.0.0.1, port 49518 for outgoing packets
> >     Tracing the path to 127.0.0.1 on TCP port 80 (http), 30 hops max
> >      1  localhost (127.0.0.1) [open]  0.333 ms  0.244 ms  0.186 ms
> 
> Okay, so it looks like --no-select should be the default on MacOS X.
> Based on the output of "gcc -E -dM - </dev/null" on your machine, it
> would seem that we can detect MacOS X systems by checking for the
> presence of __APPLE__ and __MACH__.  I just patched the configure.ac
> file so that autoconf should now do just that, and make --no-select the
> compile-time default for MacOS X.  Can you please confirm that it's no
> longer necessary to specify the --no-select command line argument by
> hand with tcptraceroute-1.5beta2?
> 
>   <http://michael.toren.net/code/tcptraceroute/tcptraceroute-1.5beta2.tar.gz>
> 
> > Here's the non-local case too w/ and w/o --no-select:
> [..]
> >     $ sudo ./tcptraceroute --no-select 66.135.192.87
> >     Selected device en0, address 192.168.1.200, port 49529 for outgoing packets
> >     Tracing the path to 66.135.192.87 on TCP port 80 (http), 30 hops max
> >      1  * * *
> >     ^C
> 
> Hmm.  Earlier you included a traceroute to 24.163.210.43, which was one
> hop away.  Is that the address of your local machine, or the address of
> a NAT device external to your MacOS X system?  If it's an external NAT
> device, I wonder if it could be interfering with tcptraceroute.  Can you
> please try executing the following commands, and sending back the output
> from each?
> 
> 	tcptraceroute -q1 -d 127.0.0.1
> 	tcptraceroute -q1 -d 24.163.210.43
> 	tcptraceroute -q3 -f30 -d toren.net
> 	traceroute toren.net
> 	telnet toren.net 4242
> 
> Thanks,
> -mct
> _______________________________________________
> tcptraceroute-dev mailing list
> tcptraceroute-dev@netisland.net
> https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev
> 

_______________________________________________
tcptraceroute-dev mailing list
tcptraceroute-dev@netisland.net
https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev