Date: Sat, 26 Apr 2003 19:36:57 -0400 From: Manikantan Ramadas <mramadas@cs.ohiou.edu> Subject: Re: tcptrace-bugs Problems to analyze captured files. Message-ID: <20030426233657.GA14198@irg.cs.ohiou.edu>
Hi Thomas,
tcptrace had a bug in processing IPv6 headers, which I have fixed.
You can get current tcptrace with this fix from the CVS tree at
http://www.tcptrace.org/download.html
Well, this lets tcptrace read dumpfiles captured with tcpdump.
However, it still has some issues with ethereal capture files. I shall look
into it.
Thanks for pointing us to this bug. Lemme know if it worked for you.
- Mani.
On Wed, Apr 23, 2003 at 04:53:04PM +0200, Thomas Bohnert wrote:
> Hi Mani,
>
> now im back from vacations, and here are our new cognitions:
>
> First of all, i installed the latest version of tcpdump, ethereal and libcap
> as well as the latest tcptrace and xplot. Further, to avoid problems and
> ambiguousness, we skiped using our own tool, the trafficgenerator, and use
> ssh connections for tracing. The link is physically a wlan connection and
> over that we deploy ipv6 mobile-ip (mipl). The traces attached on this file
> are simple connections without handover and all the other mobile-ip related
> stuff. The traces are captured with tcpdump or ethereal, the name of the
> files are (hopefully) selfexplaining.
>
> The problem which arose is, that we are not able to analyze the traces made by
> tcpdump or ethereal. The output of tcptrace is still the same with no
> distinction between tcpdump capturing or ethereal. ( Could there be a
> difference? Both are using libcap.. )
>
> Our goal is to write a publication about the behavior of different tcp
> implementations like Tahoe, Reno, new Reno etc. In this way we would
> appreciate to have a tool which allows us to analyze and to display the
> various effects like packet loss, throughput and many others. Tcptrace seems
> to be exactly the right tool for that purpose so your help would be highly
> appreciated.
>
> Additionally i asked for the permission to send you our trafficgenerator. If
> it would be helpful for you and it is possible i will send them as soon as
> possible, although i assume that there is no difference between a ssh
> conection and the traffic generated by our self.
>
> As a last comment, there is a obviously a bug in Ethereal:
> If you are going to open the captures with that tool, you will instantaneously
> perceive that the tcp checksum is wrong. But actually it is not. Ethereal is
> prooving the checksum but in a wrong way. If IPv6 is used and the home
> address option is present, the checksum has to be calculated with the
> home-address, anytime. Ethereal seems to use the care-of-address....
>
>
> Thanks a lot for your help!
> Thomas, Germany
>
> ========================================================
> Thomas Bohnert, Student
> Network Laboratories Heidelberg
> NEC Europe Ltd.
> Kurfürsten-Anlage 36, 69115 Heidelberg, Germany
> phone: +49 6221 90511-53
> fax: +49 6221 90511-55
> e-mail: thomas.bohnert@ccrle.nec.de
> ========================================================
>
>
> File: ssh_ip6_mn2cn_tcpd_wlan_ip4conf_prom_snaplen0.cap
> ssh session over ipv6 mobilenode -> correspondend node captured with tcpdump
> over wlan0 in promiscous mode and snaplen 0 ( parameter for tcpdump)
>
> File : ssh_ip6_mn2cn_ethereal_0_9_11.cap
> ssh session over ipv6 mobilenode -> correspondend node captured with ethereal
> over wlan0 in promiscous mode
>
> File: test_ipv4.cap
> next to some random traffic there is one connection with our traffic generator
> over ipv4, destination port is 7001.
>
>
> Here is some sample output of tcptrace:
> ####
> [root@mira traces]# tcptrace ssh_ip6_mn2cn_tcpd_wlan_ip4conf_prom_snaplen0.cap
> 1 arg remaining, starting with
> 'ssh_ip6_mn2cn_tcpd_wlan_ip4conf_prom_snaplen0.cap'
> Ostermann's tcptrace -- version 6.4.0 -- Thu Apr 3, 2003
>
> 80 packets seen, 0 TCP packets traced
> elapsed wallclock time: 0:00:00.022224, 3599 pkts/sec analyzed
> trace file elapsed time: 0:00:16.538180
> no traced TCP packets
> ####
>
> ####
> [root@mira traces]# tcptrace test_ipv4.cap
> 1 arg remaining, starting with 'test_ipv4.cap'
> Ostermann's tcptrace -- version 6.4.0 -- Thu Apr 3, 2003
>
> 2026 packets seen, 2010 TCP packets traced
> elapsed wallclock time: 0:00:00.069052, 29340 pkts/sec analyzed
> trace file elapsed time: 0:01:03.283814
> TCP connection info:
> 1: 10.10.254.249:1077 - 10.13.20.4:7001 (a2b) 2> 1< (reset)
> ** Warning, a2b: detected 1 hardware duplicate(s) (same seq # and IP ID)
> 2: 10.10.254.249:1078 - 10.13.20.4:7001 (c2d) 1005> 1002< (complete)
> ** Warning, c2d: detected 1 hardware duplicate(s) (same seq # and IP ID)
> ####
>
>
>
>
>
>
>
>
>
> On Friday 18 April 2003 04:08, you wrote:
> > Hi Thomas,
> >
> > I guess the header you have given me is the link layer header, right?
> > This header structure is new to me (Why does the header of each packet have
> > the total# of packets in a field?)
> >
> > Could you please give us a sample dumpfile containing this traffic, so I
> > can parallely see how ethereal understands it, to figure out what can
> > be done for tcptrace?
> >
> > Thanks!
> > Mani.
> >
> > On Thu, Apr 17, 2003 at 03:13:23PM +0200, Thomas Bohnert wrote:
> > > Hi Mani,
> > >
> > > of course, here is the information.
> > >
> > > /* the fixed header of each packet */
> > > struct packethdr_t{
> > > int number; //packet number (starts with 1)
> > > int size; // size of this packet (in bytes)
> > > int interval; // packet interval (in ms)
> > > int total; // total # of packets
> > > };
> > >
> > > all data behind the header are is random.
> > >
> > > thanks for your help,
> > > Thomas
> > >
> > > On Thursday 17 April 2003 14:47, you wrote:
> > > > Hi Thomas,
> > > >
> > > > It seems to me that tcptrace does not understand the packet format in
> > > > the traffic you collect. Could you please give us a sample dumpfile
> > > > with this packet format?
> > > >
> > > > - Mani.
> > > >
> > > > On Thu, Apr 17, 2003 at 01:34:17PM +0200, Thomas Bohnert wrote:
> > > > > Hi,
> > > > >
> > > > > We do some investigations in mobile IPv6 and fast handovers. The goal
> > > > > is to find out the packet loss and the impact for the tcp/ip stack.
> > > > > To analyze the trafffic i choose tcptrace as recommended in RFCxxx.
> > > > > In this way, i caputred some random traffic over a wlan link with
> > > > > tcpdump. This traffic is generated by a small selfwritten generator.
> > > > > Ethereal is able to open the produced file and to decode all headers
> > > > > including tcp. The payload of the packets is shown as TCP short frame
> > > > > of course; the generator uses a proprietary protocol.
> > > > > The problem now is that i can't decode the packets with tcptrace.
> > > > > After opening the trace the following message is printed:
> > > > >
> > > > > [bothom@mira capture_11.36]# tcptrace 11.36.cap
> > > > > 1 arg remaining, starting with '11.36.cap'
> > > > > Ostermann's tcptrace -- version 6.4.0 -- Thu Apr 3, 2003
> > > > >
> > > > > 1009 packets seen, 0 TCP packets traced
> > > > > elapsed wallclock time: 0:00:00.007539, 133837 pkts/sec analyzed
> > > > > trace file elapsed time: 0:00:21.643035
> > > > > no traced TCP packets
> > > > >
> > > > > The files are captured as followed:
> > > > > tcpdump -q -i any -w 11.36.cap
> > > > >
> > > > >
> > > > > thanks for your help;
> > > > >
> > > > > Thomas Bohnert
>
> --
> ========================================================
> Thomas Bohnert, Student
> Network Laboratories Heidelberg
> NEC Europe Ltd.
> Kurfürsten-Anlage 36, 69115 Heidelberg, Germany
> phone: +49 6221 90511-53
> fax: +49 6221 90511-55
> e-mail: thomas.bohnert@ccrle.nec.de
> ========================================================
-- "A man is but a product of his thoughts; what he thinks, that he becomes." - Mahatma Gandhi ____________________________________________________________________________ * Manikantan Ramadas * IRG, Ohio Univ. * http://irg.cs.ohiou.edu/~mramadas * ____________________________________________________________________________
This archive was generated by hypermail 2b30 : 04/27/03 EDT