Joel L. Breazeale on Mon, 26 May 2003 15:16:06 -0400


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [tcptra-dev] tcptraceroute-1.5beta1


Michael,

I have the output for tcptraceroute -d 66.135.192.87 below.  I did, however,
run the output through uniq to delete repeated cases of "debug: null pointer
from pcap-next()".  Here's the output:

    debug: tcptraceroute 1.5beta2
    debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100)
    debug: entering getinterfaces()
    debug: ifreq buffer set to 32
    debug: Successfully retrieved interface list
    debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses.
    debug: Discovered interface lo0 with address 24.3.0.0
    debug: Ignoring AF_INET6 address on interface lo0
    debug: Discovered interface lo0 with address 127.0.0.1
    debug: Ignoring down interface gif0
    debug: Ignoring down interface stf0
    debug: Discovered interface en0 with address 6.3.6.0
    debug: Ignoring AF_INET6 address on interface en0
    debug: Discovered interface en0 with address 192.168.1.200
    debug: leaving getinterfaces()
    debug: Determined source address of 192.168.1.200 to reach 66.135.192.87
    debug: entering finddev()
    debug: finddev() returning en0
    debug: Setting o_syn, in absence of either o_syn or o_ack
    debug: debugoptions():
    debug:         TEXTSIZE: 1024        SNAPLEN: 92     IPTOSBUFFERS: 12
    debug: ALLOCATEID_CACHE: 512         datalink: 1    datalinkoffset: 14
    debug:         o_minttl: 1          o_maxttl: 30        o_timeout: 3 
    debug:          o_debug: 1         o_numeric: 0          o_pktlen: 0 
    debug:       o_nqueries: 3        o_dontfrag: 0             o_tos: 0 
    debug:      o_forceport: 0             o_syn: 1             o_ack: 0 
    debug:            o_ecn: 0        o_nofilter: 0 o_nogetinterfaces: 0 
    debug:      o_trackport: 0      datalinkname: ETHERNET     device: en0
    debug:       o_noselect: 1 
    Selected device en0, address 192.168.1.200, port 49217 for outgoing packets
    debug: pcap filter is: 
                    (tcp and src host 66.135.192.87 and src port 80 and dst host 192.168.1.200)
                    or ((icmp[0] == 11 or icmp[0] == 3) and dst host 192.168.1.200)
    Tracing the path to 66.135.192.87 on TCP port 80 (http), 30 hops max
    debug: Initializing packet buffer of 40 bytes
    debug: Generating a new batch of 512 IP ID's
    debug: Sent probe 1 of 3 for hop 1, IP ID 45622, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     1  *
    
    debug: Sent probe 2 of 3 for hop 1, IP ID 47990, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 1, IP ID 40158, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 2, IP ID 17704, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     2  *
    
    debug: Sent probe 2 of 3 for hop 2, IP ID 36518, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 2, IP ID 16899, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 3, IP ID 8774, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     3  *
    
    debug: Sent probe 2 of 3 for hop 3, IP ID 21959, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 3, IP ID 52126, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 4, IP ID 5061, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     4  *
    
    debug: Sent probe 2 of 3 for hop 4, IP ID 1495, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 4, IP ID 28058, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 5, IP ID 38614, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     5  *
    
    debug: Sent probe 2 of 3 for hop 5, IP ID 24797, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 5, IP ID 8573, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 6, IP ID 24243, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     6  *
    
    debug: Sent probe 2 of 3 for hop 6, IP ID 36064, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 6, IP ID 23398, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 7, IP ID 4701, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     7  *
    
    debug: Sent probe 2 of 3 for hop 7, IP ID 36789, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 7, IP ID 28170, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 8, IP ID 14890, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     8  *
    
    debug: Sent probe 2 of 3 for hop 8, IP ID 52174, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 8, IP ID 23181, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 9, IP ID 5354, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     9  *
    
    debug: Sent probe 2 of 3 for hop 9, IP ID 24451, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 9, IP ID 57822, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 10, IP ID 40097, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
    10  *
    
    debug: Sent probe 2 of 3 for hop 10, IP ID 14589, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 10, IP ID 18825, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 11, IP ID 27436, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
    11  *
    
    debug: Sent probe 2 of 3 for hop 11, IP ID 27443, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 11, IP ID 34047, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 12, IP ID 34826, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
    12  *
    
    debug: Sent probe 2 of 3 for hop 12, IP ID 12379, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 12, IP ID 37798, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 13, IP ID 51725, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
    13  *
    
    debug: Sent probe 2 of 3 for hop 13, IP ID 21154, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 3 of 3 for hop 13, IP ID 59757, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: timeout
    debug: displayed hop
     *
    
    debug: Sent probe 1 of 3 for hop 14, IP ID 38316, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: received 50 byte IP packet from pcap_next()
    debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK 
    debug: displayed hop
    14  pages.ebay.com (66.135.192.87) [open]  98.002 ms
    
    debug: Sent probe 2 of 3 for hop 14, IP ID 26215, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: received 50 byte IP packet from pcap_next()
    debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK 
    debug: displayed hop
      82.819 ms
    
    debug: Sent probe 3 of 3 for hop 14, IP ID 28485, source port 49217, SYN 
    debug: null pointer from pcap_next()
    debug: received 50 byte IP packet from pcap_next()
    debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK 
    debug: displayed hop
      81.313 ms
    
Also, recall the traceroute I did from work to my home system:

    # tcptraceroute 24.163.210.43
    Selected device eth0, address 10.1.3.55, port 59596 for outgoing packets
    Tracing the path to 24.163.210.43 on TCP port 80, 30 hops max
     1  10.1.0.1 (10.1.0.1)  2.421 ms  1.192 ms  1.182 ms
     2  12.33.166.1 (12.33.166.1)  10.045 ms  2.697 ms  2.659 ms
     3  12.125.171.113 (12.125.171.113)  4.121 ms  4.171 ms  4.182 ms
     4  gbr2-p24.cgcil.ip.att.net (12.123.204.6)  17.711 ms  18.789 ms  14.336 ms
     5  tbr2-p013602.cgcil.ip.att.net (12.122.11.53)  13.776 ms  13.718 ms  13.926 ms
     6  ggr2-p390.cgcil.ip.att.net (12.123.6.37)  13.790 ms  14.677 ms  14.313 ms
     7  att-gw.chi.aol.com (192.205.32.238)  14.683 ms  22.866 ms  14.669 ms
     8  rr-min.atdn.net (66.185.141.102)  33.592 ms  38.862 ms  33.687 ms
     9  srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4)  34.834 ms  34.719 ms  34.501 ms
    10  mogwai (24.163.210.43) [open]  46.211 ms  44.050 ms *
    # 

I thought it would be interesting to try each hop separately from home toward
my work IP address of 12.33.166.1.  Here's the result:

    # ./tcptraceroute 24.163.210.43
    Selected device en0, address 192.168.1.200, port 49224 for outgoing packets
    Tracing the path to 24.163.210.43 on TCP port 80 (http), 30 hops max
     1  cpe-24-163-210-43.mn.rr.com (24.163.210.43) [open]  1.289 ms  0.981 ms  1.391 ms
    # ./tcptraceroute 24.26.162.4  
    Selected device en0, address 192.168.1.200, port 49225 for outgoing packets
    Tracing the path to 24.26.162.4 on TCP port 80 (http), 30 hops max
     1  srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4) [closed]  12.812 ms  14.910 ms  13.095 ms
    # ./tcptraceroute 66.185.141.102
    Selected device en0, address 192.168.1.200, port 49226 for outgoing packets
    Tracing the path to 66.185.141.102 on TCP port 80 (http), 30 hops max
     1  * * *
     2  rr-min.atdn.net (66.185.141.102) [closed]  13.533 ms  11.139 ms  25.646 ms
    # ./tcptraceroute 192.205.32.238
    Selected device en0, address 192.168.1.200, port 49227 for outgoing packets
    Tracing the path to 192.205.32.238 on TCP port 80 (http), 30 hops max
     1  * * *
     2  * * *
     3  * * *
     4  * * *
     5  * * *
     6  * * *
     7  * * *
     8  * * *
     9  * * *
    10  * * *
    11  * * *
    12  * * *
    13  * * *
    14  * * *
    15  * * *
    16  * * *
    17  * * *
    18  * * *
    19  * * *
    20  * * *
    21  * * *
    22  * * *
    23  * * *
    24  * * *
    25  * * *
    26  * * *
    27  * * *
    28  * * *
    29  * * *
    30  * * *
    Destination not reached
    # 

--Joel

> Joel wrote:
> > I thought it would be prudent to forward a few comments from Jerry
> > Talkington.  He has tcptraceroute v1.4 working on MacOS X.  He used the
> > -DHASSALEN as a compilation option.  If you would like me to try
> > anything related to this then just let me know.
> 
> Yes, tcptraceroute-1.4 defined HASSALEN if __OpenBSD__, __FreeBSD__, or
> __bsdi__ was also defined, in a less than perfect attempt to use HASSALEN
> on BSD systems.  However as of 1.5beta1, an autoconf test is now run to
> determine if the socket structure contains a member named "sa_len", which
> is much more reliable.  The debugging output you included in a subsequent
> message indicates that it has indeed determined to use the sa_len structure
> member on your system:
> 
> 	debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses.
> 
> Jerry wrote:
> > I haven't tried that version yet, but I just got the 1.4 version working
> > by specifying -DHASSALEN on the command line.  I'm having the same
> > problem, though, even when I try to access machines inside my
> > firewall...
> 
> When you have some time, can you please try the current 1.5beta, and
> include the output of "tcptraceroute -d <remote host>" on your system?
> 
> Thanks!
> -mct
> _______________________________________________
> tcptraceroute-dev mailing list
> tcptraceroute-dev@netisland.net
> https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev
> 

_______________________________________________
tcptraceroute-dev mailing list
tcptraceroute-dev@netisland.net
https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev