Joel L. Breazeale on Mon, 26 May 2003 15:16:06 -0400 |
Michael, I have the output for tcptraceroute -d 66.135.192.87 below. I did, however, run the output through uniq to delete repeated cases of "debug: null pointer from pcap-next()". Here's the output: debug: tcptraceroute 1.5beta2 debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100) debug: entering getinterfaces() debug: ifreq buffer set to 32 debug: Successfully retrieved interface list debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses. debug: Discovered interface lo0 with address 24.3.0.0 debug: Ignoring AF_INET6 address on interface lo0 debug: Discovered interface lo0 with address 127.0.0.1 debug: Ignoring down interface gif0 debug: Ignoring down interface stf0 debug: Discovered interface en0 with address 6.3.6.0 debug: Ignoring AF_INET6 address on interface en0 debug: Discovered interface en0 with address 192.168.1.200 debug: leaving getinterfaces() debug: Determined source address of 192.168.1.200 to reach 66.135.192.87 debug: entering finddev() debug: finddev() returning en0 debug: Setting o_syn, in absence of either o_syn or o_ack debug: debugoptions(): debug: TEXTSIZE: 1024 SNAPLEN: 92 IPTOSBUFFERS: 12 debug: ALLOCATEID_CACHE: 512 datalink: 1 datalinkoffset: 14 debug: o_minttl: 1 o_maxttl: 30 o_timeout: 3 debug: o_debug: 1 o_numeric: 0 o_pktlen: 0 debug: o_nqueries: 3 o_dontfrag: 0 o_tos: 0 debug: o_forceport: 0 o_syn: 1 o_ack: 0 debug: o_ecn: 0 o_nofilter: 0 o_nogetinterfaces: 0 debug: o_trackport: 0 datalinkname: ETHERNET device: en0 debug: o_noselect: 1 Selected device en0, address 192.168.1.200, port 49217 for outgoing packets debug: pcap filter is: (tcp and src host 66.135.192.87 and src port 80 and dst host 192.168.1.200) or ((icmp[0] == 11 or icmp[0] == 3) and dst host 192.168.1.200) Tracing the path to 66.135.192.87 on TCP port 80 (http), 30 hops max debug: Initializing packet buffer of 40 bytes debug: Generating a new batch of 512 IP ID's debug: Sent probe 1 of 3 for hop 1, IP ID 45622, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 1 * debug: Sent probe 2 of 3 for hop 1, IP ID 47990, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 1, IP ID 40158, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 2, IP ID 17704, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 2 * debug: Sent probe 2 of 3 for hop 2, IP ID 36518, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 2, IP ID 16899, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 3, IP ID 8774, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 3 * debug: Sent probe 2 of 3 for hop 3, IP ID 21959, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 3, IP ID 52126, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 4, IP ID 5061, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 4 * debug: Sent probe 2 of 3 for hop 4, IP ID 1495, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 4, IP ID 28058, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 5, IP ID 38614, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 5 * debug: Sent probe 2 of 3 for hop 5, IP ID 24797, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 5, IP ID 8573, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 6, IP ID 24243, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 6 * debug: Sent probe 2 of 3 for hop 6, IP ID 36064, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 6, IP ID 23398, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 7, IP ID 4701, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 7 * debug: Sent probe 2 of 3 for hop 7, IP ID 36789, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 7, IP ID 28170, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 8, IP ID 14890, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 8 * debug: Sent probe 2 of 3 for hop 8, IP ID 52174, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 8, IP ID 23181, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 9, IP ID 5354, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 9 * debug: Sent probe 2 of 3 for hop 9, IP ID 24451, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 9, IP ID 57822, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 10, IP ID 40097, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 10 * debug: Sent probe 2 of 3 for hop 10, IP ID 14589, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 10, IP ID 18825, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 11, IP ID 27436, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 11 * debug: Sent probe 2 of 3 for hop 11, IP ID 27443, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 11, IP ID 34047, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 12, IP ID 34826, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 12 * debug: Sent probe 2 of 3 for hop 12, IP ID 12379, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 12, IP ID 37798, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 13, IP ID 51725, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop 13 * debug: Sent probe 2 of 3 for hop 13, IP ID 21154, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 3 of 3 for hop 13, IP ID 59757, source port 49217, SYN debug: null pointer from pcap_next() debug: timeout debug: displayed hop * debug: Sent probe 1 of 3 for hop 14, IP ID 38316, source port 49217, SYN debug: null pointer from pcap_next() debug: received 50 byte IP packet from pcap_next() debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK debug: displayed hop 14 pages.ebay.com (66.135.192.87) [open] 98.002 ms debug: Sent probe 2 of 3 for hop 14, IP ID 26215, source port 49217, SYN debug: null pointer from pcap_next() debug: received 50 byte IP packet from pcap_next() debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK debug: displayed hop 82.819 ms debug: Sent probe 3 of 3 for hop 14, IP ID 28485, source port 49217, SYN debug: null pointer from pcap_next() debug: received 50 byte IP packet from pcap_next() debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK debug: displayed hop 81.313 ms Also, recall the traceroute I did from work to my home system: # tcptraceroute 24.163.210.43 Selected device eth0, address 10.1.3.55, port 59596 for outgoing packets Tracing the path to 24.163.210.43 on TCP port 80, 30 hops max 1 10.1.0.1 (10.1.0.1) 2.421 ms 1.192 ms 1.182 ms 2 12.33.166.1 (12.33.166.1) 10.045 ms 2.697 ms 2.659 ms 3 12.125.171.113 (12.125.171.113) 4.121 ms 4.171 ms 4.182 ms 4 gbr2-p24.cgcil.ip.att.net (12.123.204.6) 17.711 ms 18.789 ms 14.336 ms 5 tbr2-p013602.cgcil.ip.att.net (12.122.11.53) 13.776 ms 13.718 ms 13.926 ms 6 ggr2-p390.cgcil.ip.att.net (12.123.6.37) 13.790 ms 14.677 ms 14.313 ms 7 att-gw.chi.aol.com (192.205.32.238) 14.683 ms 22.866 ms 14.669 ms 8 rr-min.atdn.net (66.185.141.102) 33.592 ms 38.862 ms 33.687 ms 9 srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4) 34.834 ms 34.719 ms 34.501 ms 10 mogwai (24.163.210.43) [open] 46.211 ms 44.050 ms * # I thought it would be interesting to try each hop separately from home toward my work IP address of 12.33.166.1. Here's the result: # ./tcptraceroute 24.163.210.43 Selected device en0, address 192.168.1.200, port 49224 for outgoing packets Tracing the path to 24.163.210.43 on TCP port 80 (http), 30 hops max 1 cpe-24-163-210-43.mn.rr.com (24.163.210.43) [open] 1.289 ms 0.981 ms 1.391 ms # ./tcptraceroute 24.26.162.4 Selected device en0, address 192.168.1.200, port 49225 for outgoing packets Tracing the path to 24.26.162.4 on TCP port 80 (http), 30 hops max 1 srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4) [closed] 12.812 ms 14.910 ms 13.095 ms # ./tcptraceroute 66.185.141.102 Selected device en0, address 192.168.1.200, port 49226 for outgoing packets Tracing the path to 66.185.141.102 on TCP port 80 (http), 30 hops max 1 * * * 2 rr-min.atdn.net (66.185.141.102) [closed] 13.533 ms 11.139 ms 25.646 ms # ./tcptraceroute 192.205.32.238 Selected device en0, address 192.168.1.200, port 49227 for outgoing packets Tracing the path to 192.205.32.238 on TCP port 80 (http), 30 hops max 1 * * * 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * * 10 * * * 11 * * * 12 * * * 13 * * * 14 * * * 15 * * * 16 * * * 17 * * * 18 * * * 19 * * * 20 * * * 21 * * * 22 * * * 23 * * * 24 * * * 25 * * * 26 * * * 27 * * * 28 * * * 29 * * * 30 * * * Destination not reached # --Joel > Joel wrote: > > I thought it would be prudent to forward a few comments from Jerry > > Talkington. He has tcptraceroute v1.4 working on MacOS X. He used the > > -DHASSALEN as a compilation option. If you would like me to try > > anything related to this then just let me know. > > Yes, tcptraceroute-1.4 defined HASSALEN if __OpenBSD__, __FreeBSD__, or > __bsdi__ was also defined, in a less than perfect attempt to use HASSALEN > on BSD systems. However as of 1.5beta1, an autoconf test is now run to > determine if the socket structure contains a member named "sa_len", which > is much more reliable. The debugging output you included in a subsequent > message indicates that it has indeed determined to use the sa_len structure > member on your system: > > debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses. > > Jerry wrote: > > I haven't tried that version yet, but I just got the 1.4 version working > > by specifying -DHASSALEN on the command line. I'm having the same > > problem, though, even when I try to access machines inside my > > firewall... > > When you have some time, can you please try the current 1.5beta, and > include the output of "tcptraceroute -d <remote host>" on your system? > > Thanks! > -mct > _______________________________________________ > tcptraceroute-dev mailing list > tcptraceroute-dev@netisland.net > https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev > _______________________________________________ tcptraceroute-dev mailing list tcptraceroute-dev@netisland.net https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev
|
|