What drives the lights?  I don't have that degree of detail handy, but I
guess the question I'd have to ask is this: is there a way to get
Wireshark to _see_ runts or packets with invalid CRC, or other errors?
I recognize that you're asking if there's a way to get the ethernet
adapter to supply this info, so I'm going to assume that either way, it's
not a function of Wireshark.


_______________________________________________________
Alan Partis
thundernet development group



On Sat, 5 Jan 2019, Guy Harris wrote:

> On Jan 5, 2019, at 9:53 AM, Alan Partis <alpar...@thundernet.com> wrote:
>
> > I've got a case where I'm certain there are packets on the wire, but I'm
> > not able to pick them up in wireshark/tshark (or from tcpdump and dumpcap
> > either for that matter).
> >
> > The setup:
> >
> > a device (that is currently under development -- I'm the developer)
> > appears to be flooding the network with some kind of packet, but the
> > device itself appears to be off line i.e. `ip addr` reports no address for
> > the interface and indicates that its 'state' is down.  The packet flood is
> > enough to DOS the rest of my LAN (unless I segregate or isolate it) and
> > the flood stops when I disconnect the device from the LAN.
> >
> >
> > The evidence:
> >
> > * the local switch shows flashing activity lights on the port
> >   the device is connected to.
> > * I've inserted a sharktap device in-line between the device and the
> >   switch -- activity lights flash on all ports there as well.
>
> What drives those lights?
>
> I.e., do they light up if:
>
>       a runt packet is seen;
>
>       a packet with an invalid CRC is seen;
>
>       other low-level packet errors occur?
>
> > The problem:
> >
> > * I can't sniff these packets.
>
> On the machine on which you're sniffing:
>
>       can the Ethernet adapter supply packet events for runt packets/packets 
> with an invalid CRC/other errors?
>
>       if so, does the driver in the OS for that machine put the adapter into 
> that mode when you tell the driver to put the adapter into promiscuous mode 
> (I think some drivers do)?
>
> > I have command line/console access on the device itself, but running
> > tcpdump there doesn't show the packet flood.  I presume this is because
> > the ethernet driver is not reporting anything back to the kernel because
> > it thinks it's down.
>
> You'd have to look at the driver, or ask the vendor about it if it's not 
> open-source, to see if that's the case.
>
> What OS is the device running?  (I'm guessing it's probably running some OS, 
> probably UNIX-like but possibly Windows, given that you mention tcpdump.)
>
> If the interface is configured down, does the code path from whatever code 
> would send packets to the point at which packets are handed to the adapter 
> (not the driver, the adapter, so this code path includes the driver) still 
> function on that OS with that driver?
>
> If so, where is the "looping back" for receiving transmitted packets done?  I 
> think it's done above the driver in Linux, but done in the driver in 
> BSD-flavored OSes.
> ___________________________________________________________________________
> Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
> Archives:    https://www.wireshark.org/lists/wireshark-users
> Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
>              mailto:wireshark-users-requ...@wireshark.org?subject=unsubscribe
___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-requ...@wireshark.org?subject=unsubscribe

Reply via email to