⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 traceroutectltable.h

📁 snmp的源代码,已经在我的ubuntu下编译通过
💻 H
📖 第 1 页 / 共 2 页
字号:
 *     11  nic.merit.edu (35.1.1.48)  239 ms  239 ms  239 ms * * Note that lines 2 & 3 are the same.  This is due to a buggy * kernel on the 2nd hop system -- lbl-csam.arpa -- that forwards * packets with a zero ttl. * * A more interesting example is: * *     [yak 72]% traceroute allspice.lcs.mit.edu. *     traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max *      1  helios.ee.lbl.gov (128.3.112.1)  0 ms  0 ms  0 ms *      2  lilac-dmc.Berkeley.EDU (128.32.216.1)  19 ms  19 ms  19 ms *      3  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  19 ms  19 ms *      4  ccngw-ner-cc.Berkeley.EDU (128.32.136.23)  19 ms  39 ms  39 ms *      5  ccn-nerif22.Berkeley.EDU (128.32.168.22)  20 ms  39 ms  39 ms *      6  128.32.197.4 (128.32.197.4)  59 ms  119 ms  39 ms *      7  131.119.2.5 (131.119.2.5)  59 ms  59 ms  39 ms *      8  129.140.70.13 (129.140.70.13)  80 ms  79 ms  99 ms *      9  129.140.71.6 (129.140.71.6)  139 ms  139 ms  159 ms *     10  129.140.81.7 (129.140.81.7)  199 ms  180 ms  300 ms *     11  129.140.72.17 (129.140.72.17)  300 ms  239 ms  239 ms *     12  * * * *     13  128.121.54.72 (128.121.54.72)  259 ms  499 ms  279 ms *     14  * * * *     15  * * * *     16  * * * *     17  * * * *     18  ALLSPICE.LCS.MIT.EDU (18.26.0.115)  339 ms  279 ms  279 ms * * (I start to see why I'm having so much trouble with mail to * MIT.)  Note that the gateways 12, 14, 15, 16 & 17 hops away * either don't send ICMP "time exceeded" messages or send them * with a ttl too small to reach us.  14 - 17 are running the * MIT C Gateway code that doesn't send "time exceeded"s.  God * only knows what's going on with 12. * * The silent gateway 12 in the above may be the result of a bug in * the 4.[23]BSD network code (and its derivatives):  4.x (x <= 3) * sends an unreachable message using whatever ttl remains in the * original datagram.  Since, for gateways, the remaining ttl is * zero, the icmp "time exceeded" is guaranteed to not make it back * to us.  The behavior of this bug is slightly more interesting * when it appears on the destination system: * *      1  helios.ee.lbl.gov (128.3.112.1)  0 ms  0 ms  0 ms *      2  lilac-dmc.Berkeley.EDU (128.32.216.1)  39 ms  19 ms  39 ms *      3  lilac-dmc.Berkeley.EDU (128.32.216.1)  19 ms  39 ms  19 ms *      4  ccngw-ner-cc.Berkeley.EDU (128.32.136.23)  39 ms  40 ms  19 ms *      5  ccn-nerif35.Berkeley.EDU (128.32.168.35)  39 ms  39 ms  39 ms *      6  csgw.Berkeley.EDU (128.32.133.254)  39 ms  59 ms  39 ms *      7  * * * *      8  * * * *      9  * * * *     10  * * * *     11  * * * *     12  * * * *     13  rip.Berkeley.EDU (128.32.131.22)  59 ms !  39 ms !  39 ms ! * * Notice that there are 12 "gateways" (13 is the final * destination) and exactly the last half of them are "missing". * What's really happening is that rip (a Sun-3 running Sun OS3.5) * is using the ttl from our arriving datagram as the ttl in its * icmp reply.  So, the reply will time out on the return path * (with no notice sent to anyone since icmp's aren't sent for * icmp's) until we probe with a ttl that's at least twice the path * length.  I.e., rip is really only 7 hops away.  A reply that * returns with a ttl of 1 is a clue this problem exists. * Traceroute prints a "!" after the time if the ttl is <= 1. * Since vendors ship a lot of obsolete (DEC's Ultrix, Sun 3.x) or * non-standard (HPUX) software, expect to see this problem * frequently and/or take care picking the target host of your * probes. * * Other possible annotations after the time are !H, !N, !P (got a host, * network or protocol unreachable, respectively), !S or !F (source * route failed or fragmentation needed -- neither of these should * ever occur and the associated gateway is busted if you see one).  If * almost all the probes result in some kind of unreachable, traceroute * will give up and exit. * * Notes * ----- * This program must be run by root or be setuid.  (I suggest that * you *don't* make it setuid -- casual use could result in a lot * of unnecessary traffic on our poor, congested nets.) * * This program requires a kernel mod that does not appear in any * system available from Berkeley:  A raw ip socket using proto * IPPROTO_RAW must interpret the data sent as an ip datagram (as * opposed to data to be wrapped in a ip datagram).  See the README * file that came with the source to this program for a description * of the mods I made to /sys/netinet/raw_ip.c.  Your mileage may * vary.  But, again, ANY 4.x (x < 4) BSD KERNEL WILL HAVE TO BE * MODIFIED TO RUN THIS PROGRAM. * * The udp port usage may appear bizarre (well, ok, it is bizarre). * The problem is that an icmp message only contains 8 bytes of * data from the original datagram.  8 bytes is the size of a udp * header so, if we want to associate replies with the original * datagram, the necessary information must be encoded into the * udp header (the ip id could be used but there's no way to * interlock with the kernel's assignment of ip id's and, anyway, * it would have taken a lot more kernel hacking to allow this * code to set the ip id).  So, to allow two or more users to * use traceroute simultaneously, we use this task's pid as the * source port (the high bit is set to move the port number out * of the "likely" range).  To keep track of which probe is being * replied to (so times and/or hop counts don't get confused by a * reply that was delayed in transit), we increment the destination * port number before each probe. * * Don't use this as a coding example.  I was trying to find a * routing problem and this code sort-of popped out after 48 hours * without sleep.  I was amazed it ever compiled, much less ran. * * I stole the idea for this program from Steve Deering.  Since * the first release, I've learned that had I attended the right * IETF working group meetings, I also could have stolen it from Guy * Almes or Matt Mathis.  I don't know (or care) who came up with * the idea first.  I envy the originators' perspicacity and I'm * glad they didn't keep the idea a secret. * * Tim Seaver, Ken Adelman and C. Philip Wood provided bug fixes and/or * enhancements to the original distribution. * * I've hacked up a round-trip-route version of this that works by * sending a loose-source-routed udp datagram through the destination * back to yourself.  Unfortunately, SO many gateways botch source * routing, the thing is almost worthless.  Maybe one day... * *  -- Van Jacobson (van@ee.lbl.gov) *     Tue Dec 20 03:50:13 PST 1988 */#include <sys/param.h>#include <sys/file.h>#include <sys/ioctl.h>#ifdef HAVE_SYS_SELECT_H#include <sys/select.h>#endif#include <sys/socket.h>#include <sys/time.h>/* include <linux/ipv6.h> *//* include <linux/in6.h> */#include "in6.h"#include "ipv6.h"#include <linux/icmpv6.h>#include <netinet/in_systm.h>#include <netinet/in.h>#include <netinet/ip.h>#include "ip_var.h"#include <netinet/ip_icmp.h>#include <netinet/udp.h>#include "udp_var.h"/* include <linux/if.h> */#include <arpa/inet.h>#include <ctype.h>#include <errno.h>#include <fcntl.h>#ifdef HAVE_MALLOC_H#include <malloc.h>#endif#include <memory.h>#include <netdb.h>#include <stdio.h>#include <stdlib.h>#include <string.h>#include <unistd.h>#include "gnuc.h"#ifdef HAVE_OS_PROTO_H#include "os-proto.h"#endif#include <net/if.h>#if __linux__#include <endian.h>#endif/* * rfc1716  */#ifndef ICMP_UNREACH_FILTER_PROHIB#define ICMP_UNREACH_FILTER_PROHIB	13      /* admin prohibited filter */#endif#ifndef ICMP_UNREACH_HOST_PRECEDENCE#define ICMP_UNREACH_HOST_PRECEDENCE	14      /* host precedence violation */#endif#ifndef ICMP_UNREACH_PRECEDENCE_CUTOFF#define ICMP_UNREACH_PRECEDENCE_CUTOFF	15      /* precedence cutoff */#endif#define MAXPACKET	65535/* * Maximum number of gateways (include room for one noop)  */#define NGATEWAYS ((int)((MAX_IPOPTLEN - IPOPT_MINOFF - 1) / sizeof(u_int32_t)))#ifndef MAXHOSTNAMELEN#define MAXHOSTNAMELEN	64#endif#ifndef FD_SET#define NFDBITS         (8*sizeof(fd_set))#define FD_SETSIZE      NFDBITS#define FD_SET(n, p)    ((p)->fds_bits[(n)/NFDBITS] |= (1 << ((n) % NFDBITS)))#define FD_CLR(n, p)    ((p)->fds_bits[(n)/NFDBITS] &= ~(1 << ((n) % NFDBITS)))#define FD_ISSET(n, p)  ((p)->fds_bits[(n)/NFDBITS] & (1 << ((n) % NFDBITS)))#define FD_ZERO(p)      bzero((char *)(p), sizeof(*(p)))#endif#define Fprintf (void)fprintf#define Printf (void)printf/* * Host name and address list  */struct hostinfo {    char           *name;    int             n;    u_int32_t      *addrs;};/* * Data section of the probe packet  */struct outdata {    u_char          seq;        /* sequence number of this packet */    u_char          ttl;        /* ttl packet left with */    struct timeval  tv;         /* time packet left */};#ifndef HAVE_ICMP_NEXTMTU/* * Path MTU Discovery (RFC1191)  */struct my_pmtu {    u_short         ipm_void;    u_short         ipm_nextmtu;};#endifstruct ifaddrlist {    u_int32_t       addr;    char           *device;};char           *prog;struct pkt_format {    __u32           ident;    __u32           seq;    struct timeval  tv;};extern int      optind;extern int      opterr;extern char    *optarg;/* * Forwards  */unsigned long   deltaT(struct timeval *, struct timeval *);unsigned long   round(double);void            freehostinfo(struct hostinfo *);void            getaddr(u_int32_t *, char *);struct hostinfo *gethostinfo(char *);u_short         in_checksum(u_short *, int);char           *inetname(struct in_addr);void            run_traceRoute(unsigned int, void *);int             packet_ok(u_char *, int, struct sockaddr_in *, int,                          u_short, int, u_short);char           *pr_type(u_char); /* void print(u_char *, int, struct sockaddr_in *); */void            send_probe(struct sockaddr_in *, int, int,                           struct timeval *, struct ip *, struct udphdr *,                           int, int, char *, u_short, int, u_short,                           struct outdata *);int             str2val(const char *, const char *, int, int);void            tvsub(struct timeval *, struct timeval *);int             wait_for_reply(int, struct sockaddr_in *,                               const struct timeval *, u_char *, int);#ifndef HAVE_USLEEPint             usleep(u_int);#endifvoid            setsin(struct sockaddr_in *, u_int32_t);int             ifaddrlist(struct ifaddrlist **, char *);const char     *findsaddr(const struct sockaddr_in *,                          struct sockaddr_in *);struct addrinfo *host_serv_tr(const char *, const char *, int, int);char           *sock_ntop_host_tr(const struct sockaddr *, socklen_t);void            send_probe_v6(int, int, char *, pid_t, struct timezone *,                              int, int, struct sockaddr_in6 *, char *);int             wait_for_reply_v6(int, struct sockaddr_in6 *, int, int,                                  int, u_char *);int             packet_ok_v6(u_char *, int, struct sockaddr_in6 *, int,                             struct timeval *, pid_t);void            print_v6(unsigned char *, int, struct sockaddr_in6 *);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -