|
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
|
Re: [tcptra-dev] tcptraceroute-1.5beta1
|
Michael,
I have the output for tcptraceroute -d 66.135.192.87 below. I did, however,
run the output through uniq to delete repeated cases of "debug: null pointer
from pcap-next()". Here's the output:
debug: tcptraceroute 1.5beta2
debug: Compiled with libpcap 0.6, libnet 1.0.2a (API 100)
debug: entering getinterfaces()
debug: ifreq buffer set to 32
debug: Successfully retrieved interface list
debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses.
debug: Discovered interface lo0 with address 24.3.0.0
debug: Ignoring AF_INET6 address on interface lo0
debug: Discovered interface lo0 with address 127.0.0.1
debug: Ignoring down interface gif0
debug: Ignoring down interface stf0
debug: Discovered interface en0 with address 6.3.6.0
debug: Ignoring AF_INET6 address on interface en0
debug: Discovered interface en0 with address 192.168.1.200
debug: leaving getinterfaces()
debug: Determined source address of 192.168.1.200 to reach 66.135.192.87
debug: entering finddev()
debug: finddev() returning en0
debug: Setting o_syn, in absence of either o_syn or o_ack
debug: debugoptions():
debug: TEXTSIZE: 1024 SNAPLEN: 92 IPTOSBUFFERS: 12
debug: ALLOCATEID_CACHE: 512 datalink: 1 datalinkoffset: 14
debug: o_minttl: 1 o_maxttl: 30 o_timeout: 3
debug: o_debug: 1 o_numeric: 0 o_pktlen: 0
debug: o_nqueries: 3 o_dontfrag: 0 o_tos: 0
debug: o_forceport: 0 o_syn: 1 o_ack: 0
debug: o_ecn: 0 o_nofilter: 0 o_nogetinterfaces: 0
debug: o_trackport: 0 datalinkname: ETHERNET device: en0
debug: o_noselect: 1
Selected device en0, address 192.168.1.200, port 49217 for outgoing packets
debug: pcap filter is:
(tcp and src host 66.135.192.87 and src port 80 and dst host 192.168.1.200)
or ((icmp[0] == 11 or icmp[0] == 3) and dst host 192.168.1.200)
Tracing the path to 66.135.192.87 on TCP port 80 (http), 30 hops max
debug: Initializing packet buffer of 40 bytes
debug: Generating a new batch of 512 IP ID's
debug: Sent probe 1 of 3 for hop 1, IP ID 45622, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
1 *
debug: Sent probe 2 of 3 for hop 1, IP ID 47990, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 1, IP ID 40158, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 2, IP ID 17704, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
2 *
debug: Sent probe 2 of 3 for hop 2, IP ID 36518, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 2, IP ID 16899, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 3, IP ID 8774, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
3 *
debug: Sent probe 2 of 3 for hop 3, IP ID 21959, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 3, IP ID 52126, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 4, IP ID 5061, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
4 *
debug: Sent probe 2 of 3 for hop 4, IP ID 1495, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 4, IP ID 28058, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 5, IP ID 38614, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
5 *
debug: Sent probe 2 of 3 for hop 5, IP ID 24797, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 5, IP ID 8573, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 6, IP ID 24243, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
6 *
debug: Sent probe 2 of 3 for hop 6, IP ID 36064, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 6, IP ID 23398, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 7, IP ID 4701, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
7 *
debug: Sent probe 2 of 3 for hop 7, IP ID 36789, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 7, IP ID 28170, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 8, IP ID 14890, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
8 *
debug: Sent probe 2 of 3 for hop 8, IP ID 52174, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 8, IP ID 23181, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 9, IP ID 5354, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
9 *
debug: Sent probe 2 of 3 for hop 9, IP ID 24451, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 9, IP ID 57822, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 10, IP ID 40097, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
10 *
debug: Sent probe 2 of 3 for hop 10, IP ID 14589, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 10, IP ID 18825, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 11, IP ID 27436, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
11 *
debug: Sent probe 2 of 3 for hop 11, IP ID 27443, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 11, IP ID 34047, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 12, IP ID 34826, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
12 *
debug: Sent probe 2 of 3 for hop 12, IP ID 12379, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 12, IP ID 37798, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 13, IP ID 51725, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
13 *
debug: Sent probe 2 of 3 for hop 13, IP ID 21154, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 3 of 3 for hop 13, IP ID 59757, source port 49217, SYN
debug: null pointer from pcap_next()
debug: timeout
debug: displayed hop
*
debug: Sent probe 1 of 3 for hop 14, IP ID 38316, source port 49217, SYN
debug: null pointer from pcap_next()
debug: received 50 byte IP packet from pcap_next()
debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK
debug: displayed hop
14 pages.ebay.com (66.135.192.87) [open] 98.002 ms
debug: Sent probe 2 of 3 for hop 14, IP ID 26215, source port 49217, SYN
debug: null pointer from pcap_next()
debug: received 50 byte IP packet from pcap_next()
debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK
debug: displayed hop
82.819 ms
debug: Sent probe 3 of 3 for hop 14, IP ID 28485, source port 49217, SYN
debug: null pointer from pcap_next()
debug: received 50 byte IP packet from pcap_next()
debug: Received tcp packet 66.135.192.87:80 -> 192.168.1.200:49217, flags SYN ACK
debug: displayed hop
81.313 ms
Also, recall the traceroute I did from work to my home system:
# tcptraceroute 24.163.210.43
Selected device eth0, address 10.1.3.55, port 59596 for outgoing packets
Tracing the path to 24.163.210.43 on TCP port 80, 30 hops max
1 10.1.0.1 (10.1.0.1) 2.421 ms 1.192 ms 1.182 ms
2 12.33.166.1 (12.33.166.1) 10.045 ms 2.697 ms 2.659 ms
3 12.125.171.113 (12.125.171.113) 4.121 ms 4.171 ms 4.182 ms
4 gbr2-p24.cgcil.ip.att.net (12.123.204.6) 17.711 ms 18.789 ms 14.336 ms
5 tbr2-p013602.cgcil.ip.att.net (12.122.11.53) 13.776 ms 13.718 ms 13.926 ms
6 ggr2-p390.cgcil.ip.att.net (12.123.6.37) 13.790 ms 14.677 ms 14.313 ms
7 att-gw.chi.aol.com (192.205.32.238) 14.683 ms 22.866 ms 14.669 ms
8 rr-min.atdn.net (66.185.141.102) 33.592 ms 38.862 ms 33.687 ms
9 srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4) 34.834 ms 34.719 ms 34.501 ms
10 mogwai (24.163.210.43) [open] 46.211 ms 44.050 ms *
#
I thought it would be interesting to try each hop separately from home toward
my work IP address of 12.33.166.1. Here's the result:
# ./tcptraceroute 24.163.210.43
Selected device en0, address 192.168.1.200, port 49224 for outgoing packets
Tracing the path to 24.163.210.43 on TCP port 80 (http), 30 hops max
1 cpe-24-163-210-43.mn.rr.com (24.163.210.43) [open] 1.289 ms 0.981 ms 1.391 ms
# ./tcptraceroute 24.26.162.4
Selected device en0, address 192.168.1.200, port 49225 for outgoing packets
Tracing the path to 24.26.162.4 on TCP port 80 (http), 30 hops max
1 srp1-0.mplsmn07-ubr1.mn.rr.com (24.26.162.4) [closed] 12.812 ms 14.910 ms 13.095 ms
# ./tcptraceroute 66.185.141.102
Selected device en0, address 192.168.1.200, port 49226 for outgoing packets
Tracing the path to 66.185.141.102 on TCP port 80 (http), 30 hops max
1 * * *
2 rr-min.atdn.net (66.185.141.102) [closed] 13.533 ms 11.139 ms 25.646 ms
# ./tcptraceroute 192.205.32.238
Selected device en0, address 192.168.1.200, port 49227 for outgoing packets
Tracing the path to 192.205.32.238 on TCP port 80 (http), 30 hops max
1 * * *
2 * * *
3 * * *
4 * * *
5 * * *
6 * * *
7 * * *
8 * * *
9 * * *
10 * * *
11 * * *
12 * * *
13 * * *
14 * * *
15 * * *
16 * * *
17 * * *
18 * * *
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
Destination not reached
#
--Joel
> Joel wrote:
> > I thought it would be prudent to forward a few comments from Jerry
> > Talkington. He has tcptraceroute v1.4 working on MacOS X. He used the
> > -DHASSALEN as a compilation option. If you would like me to try
> > anything related to this then just let me know.
>
> Yes, tcptraceroute-1.4 defined HASSALEN if __OpenBSD__, __FreeBSD__, or
> __bsdi__ was also defined, in a less than perfect attempt to use HASSALEN
> on BSD systems. However as of 1.5beta1, an autoconf test is now run to
> determine if the socket structure contains a member named "sa_len", which
> is much more reliable. The debugging output you included in a subsequent
> message indicates that it has indeed determined to use the sa_len structure
> member on your system:
>
> debug: Using HAVE_SOCKADDR_SA_LEN method for finding addresses.
>
> Jerry wrote:
> > I haven't tried that version yet, but I just got the 1.4 version working
> > by specifying -DHASSALEN on the command line. I'm having the same
> > problem, though, even when I try to access machines inside my
> > firewall...
>
> When you have some time, can you please try the current 1.5beta, and
> include the output of "tcptraceroute -d <remote host>" on your system?
>
> Thanks!
> -mct
> _______________________________________________
> tcptraceroute-dev mailing list
> tcptraceroute-dev@netisland.net
> https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev
>
_______________________________________________
tcptraceroute-dev mailing list
tcptraceroute-dev@netisland.net
https://lists.netisland.net/mailman/listinfo/tcptraceroute-dev
|
|