Hi
On Wed, May 16, 2007 at 05:07:55PM +0200, Bastian Venthur wrote:
> Am 16.05.2007 15:47 schrieb Ola Lundqvist:
>
> > There are a couple of things to do:
> > * Do not run in graphic mode. Instead run in text mode, because the kernel
> > may print information there.
> > * In order to sniff the traffic you need the following:
> > - An extra Linux PC with tcpdump installed (or the firewall if you can
> > install
> > tcpdump there).
> > - Access to the traffic. This means that you should use a hub (not a
> > switch)
> > or a switch where you can redirect all traffic to a certain port. If you
> > have the possibility to install tcpdump on the remote side of the
> > laptop then that will of course have access to the traffic as well.
> > - On the server run
> > tcpdump -n -i ethX
> > I think that is enough. You will see all traffic sent back and forth.
> > See man tcpdump for more information about options, disc logging etc.
>
> Since I'll capture the traffic on my router which is connected to the
> internet via DSL, should I sniff the traffic on ppp0 or the eth0 (the
> nic connected to the DSL modem)? Both will give you different output.
>
The best thing would be to sniff both as we do not know if the problem
is on ethernet level or on ppp level. I think you can sniff both
at the same time. I think you need some more options to tcpdump however:
tcpdump -envv -i eth0
You also need to reproduce this a couple of times to see if we can
see a pattern in the packages that have gone back and forth. Yes I know
that this is a tedious task!
> Sniffing on ppp0 will give you lines like
>
> 17:03:39.348240 IP 85.178.96.22 > 130.149.145.10: GREv1, call 50048, seq
> 497690, ack 957204, length 73: compressed PPP data
> 17:03:39.349089 IP 130.149.145.10 > 192.168.1.32: gre
> 17:03:39.349097 IP 130.149.145.10 > 192.168.1.32: gre
> 17:03:39.351072 IP 130.149.145.10 > 85.178.96.22: GREv1, call 0, seq
> 957206, ack 497626, length 744: compressed PPP data
> 17:03:39.353123 IP 130.149.145.10 > 192.168.1.32: gre
> 17:03:39.353131 IP 130.149.145.10 > 192.168.1.32: gre
> 17:03:39.354238 IP 85.178.96.22 > 130.149.145.10: GREv1, call 50048, seq
> 497691, ack 957206, length 73: compressed PPP data
> 17:03:39.355073 IP 130.149.145.10 > 85.178.96.22: GREv1, call 0, seq
> 957207, length 744: compressed PPP data
> 17:03:39.357123 IP 130.149.145.10 > 192.168.1.32: gre
> 17:03:39.357132 IP 130.149.145.10 > 192.168.1.32: gre
> 17:03:39.357137 IP 130.149.145.10 > 192.168.1.32: gre
> 17:03:39.357142 IP 130.149.145.10 > 192.168.1.32: gre
>
>
> while sniffing on ppp0 will give you
>
>
> 17:06:17.664578 PPPoE [ses 0x648] IP 85.178.96.22 > 130.149.145.10:
> GREv1, call 50048, seq 521743, ack 1003988, length 73: compressed PPP data
> 17:06:17.665804 PPPoE [ses 0x648] IP truncated-ip - 512 bytes missing!
> 130.149.145.10 > 85.178.96.22: GREv1, call 0, seq 1003989, length 744:
> compressed PPP data
> 17:06:17.667792 00:00:00:16:41:ad > 00:c0:4f:a9:ba:a5, ethertype Unknown
> (0x22f4), length 778:
> 0x0000: 00a0 cc75 0255 0800 4500 02f4 927f 205d ...u.U..E......]
> 0x0010: 362f f996 8295 910a c0a8 0120 7d68 3aca 6/..........}h:.
> 0x0020: d8c4 03f7 5f9d 5e4c 3b2d 606e 1d24 0cb1 ...._.^L;-`n.$..
> 0x0030: 92f8 7bab 8bef e611 53f2 632d 2e52 de6a ..{.....S.c-.R.j
> 0x0040: b5a8 9fae 8e5c 94d7 64ba 15bf 947e 85cb .....\..d....~..
> 0x0050: 61d3 a.
> 17:06:17.667799 00:00:00:16:41:ad > 00:c0:4f:a9:ba:a5, ethertype Unknown
> (0x22f4), length 75:
> 0x0000: 00a0 cc75 0255 0800 4500 0035 927f 00b9 ...u.U..E..5....
> 0x0010: 362f 1bfa 8295 910a c0a8 0120 1e09 b727 6/.............'
> 0x0020: 54eb 0d89 73f0 3767 1462 2dd5 1c1c 68ac T...s.7g.b-...h.
> 0x0030: 41e5 76a3 1e7a 0218 3046 1ba9 5d A.v..z..0F..]
> 17:06:17.671972 PPPoE [ses 0x648] IP truncated-ip - 512 bytes missing!
> 130.149.145.10 > 85.178.96.22: GREv1, call 0, seq 1003990, ack 521683,
> length 744: compressed PPP data
> 17:06:17.672049 00:00:00:16:41:ad > 00:c0:4f:a9:ba:a5, ethertype Unknown
> (0x22f4), length 778:
> 0x0000: 00a0 cc75 0255 0800 4500 02f4 9280 205d ...u.U..E......]
> 0x0010: 362f f995 8295 910a c0a8 0120 ed9e 33a3 6/............3.
> 0x0020: 9114 d298 bd67 4ef6 cd8b 4ea1 4e89 187c .....gN...N.N..|
> 0x0030: c002 75b6 386e 09e6 22f1 b95a fbf5 7c14 ..u.8n.."..Z..|.
> 0x0040: fb22 5c88 5a7c e425 a33c fd45 6744 0196 ."\.Z|.%.<.EgD..
> 0x0050: caf3 ..
> 17:06:17.672056 00:00:00:16:41:ad > 00:c0:4f:a9:ba:a5, ethertype Unknown
> (0x22f4), length 79:
> 0x0000: 00a0 cc75 0255 0800 4500 0039 9280 00b9 ...u.U..E..9....
> 0x0010: 362f 1bf5 8295 910a c0a8 0120 2669 32c4 6/..........&i2.
> 0x0020: dd09 1cc0 6d4f 0797 0eac 64da 723f 4f08 ....mO....d.r?O.
> 0x0030: c9f5 6995 7fd9 2420 607c 3508 fa6a e044 ..i...$.`|5..j.D
> 0x0040: bf
>
Regards,
// Ola
>
> Cheers,
>
> Bastian
>
>
> --
> Bastian Venthur http://venthur.de
> Debian Developer venthur at debian org
>
>
--
--- Ola Lundqvist systemkonsult --- M Sc in IT Engineering ----
/ [EMAIL PROTECTED] Annebergsslingan 37 \
| [EMAIL PROTECTED] 654 65 KARLSTAD |
| http://opalsys.net/ Mobile: +46 (0)70-332 1551 |
\ gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9 /
---------------------------------------------------------------
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]