This repository has been archived by the owner on Jul 16, 2019. It is now read-only.
forked from apenwarr/netselect
-
Notifications
You must be signed in to change notification settings - Fork 0
/
README.traceroute
126 lines (107 loc) · 3.74 KB
/
README.traceroute
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
Tue Dec 27 06:24:24 PST 1988
Traceroute is a system administrators utility to trace the route
ip packets from the current system take in getting to some
destination system. See the comments at the front of the
program for a description of its use.
This program
a) can only be run by root (it uses raw ip sockets).
b) REQUIRES A KERNEL MOD to the raw ip output code to run.
If you want to hack on your kernel, my modified version of the
routine rip_output (in file /sys/netinet/raw_ip.c) is attached.
This code may or may not resemble the code in your kernel.
It may offer you a place to start but I make no promises.
If you do hack your kernel, remember to test everything that uses
raw ip sockets (e.g., ping and egpup/gated) & make sure they still
work. I wish you the best of luck and you're on your own.
If your system has the ttl bug mentioned in the source, you
might want to fix it while you're in the kernel. (This bug
appears in all releases of BSD up to but not including 4.3tahoe.
If your version of netinet/ip_icmp.c is any earlier than 7.3
(April, '87), it has the bug.) The fix is just to add the line
ip->ip_ttl = MAXTTL;
after the line
ip->ip_src = t;
(or anywhere before the call to icmp_send) in routine icmp_reflect.
If you're running this on a pre-4.3bsd system (e.g., Sun 3.x,
Ultrix) that strips ip headers from icmp messages, add -DARCHAIC
to CFLAGS in the Makefile. Also note that rip_output contains
a conditional for a 4.2/4.3 change in the location of a raw
socket's protocol number. I've checked this under 4.3 & Sun OS
3.5 but you should double-check your system to make sure the
appropriate branch of the #if is taken (check the line that
assigned to ip->ip_p in your system's original rip_output).
A couple of awk programs to massage the traceroute output are
included. "mean.awk" and "median.awk" compute the mean and median
time to each hop, respectively. I've found that something like
traceroute -q 7 foo.somewhere >t
awk -f median.awk t | graph
can give you a quick picture of the bad spots on a long
path (median is usually a better noise filter than mean).
Enjoy.
- Van Jacobson (van@helios.ee.lbl.gov)
-------------------- rip_output from /sys/netinet/raw_ip.c
rip_output(m, so)
register struct mbuf *m;
struct socket *so;
{
register struct ip *ip;
int error;
struct rawcb *rp = sotorawcb(so);
struct sockaddr_in *sin;
#if BSD>=43
short proto = rp->rcb_proto.sp_protocol;
#else
short proto = so->so_proto->pr_protocol;
#endif
/*
* if the protocol is IPPROTO_RAW, the user handed us a
* complete IP packet. Otherwise, allocate an mbuf for a
* header and fill it in as needed.
*/
if (proto != IPPROTO_RAW) {
/*
* Calculate data length and get an mbuf
* for IP header.
*/
int len = 0;
struct mbuf *m0;
for (m0 = m; m; m = m->m_next)
len += m->m_len;
m = m_get(M_DONTWAIT, MT_HEADER);
if (m == 0) {
m = m0;
error = ENOBUFS;
goto bad;
}
m->m_off = MMAXOFF - sizeof(struct ip);
m->m_len = sizeof(struct ip);
m->m_next = m0;
ip = mtod(m, struct ip *);
ip->ip_tos = 0;
ip->ip_off = 0;
ip->ip_p = proto;
ip->ip_len = sizeof(struct ip) + len;
ip->ip_ttl = MAXTTL;
} else
ip = mtod(m, struct ip *);
if (rp->rcb_flags & RAW_LADDR) {
sin = (struct sockaddr_in *)&rp->rcb_laddr;
if (sin->sin_family != AF_INET) {
error = EAFNOSUPPORT;
goto bad;
}
ip->ip_src.s_addr = sin->sin_addr.s_addr;
} else
ip->ip_src.s_addr = 0;
ip->ip_dst = ((struct sockaddr_in *)&rp->rcb_faddr)->sin_addr;
#if BSD>=43
return (ip_output(m, rp->rcb_options, &rp->rcb_route,
(so->so_options & SO_DONTROUTE) | IP_ALLOWBROADCAST));
#else
return (ip_output(m, (struct mbuf *)0, &rp->rcb_route,
(so->so_options & SO_DONTROUTE) | IP_ALLOWBROADCAST));
#endif
bad:
m_freem(m);
return (error);
}