It is a must to use Tcpdump (to capture) and/or Wireshark (to analyse) to verify protocol implementation when doing TCP/IP network programming.
First, it can verify if the message sent by me is as intended, thus it can expose any bug in my protocol implementation. Today a bug has been found in this sense: I use Java DataOutputStream.write(int) to send a short, so only the lowest byte of the short has been sent.
Second, it can detect any inconsistency between the protocol specification, i.e., what I think the message should look like, and the actual messages that are sent by the other party, i.e., out of my control. Today, several inconsistencies have been found in this way. For instance, the length of a message (a TCP packet) is different from that defined in the spec. Clearly the spec in my hand is out of dated.
Without Tcpdump and Wireshark, I would be like walking in the dark when implementing my protocol.
Showing posts with label TCP/IP. Show all posts
Showing posts with label TCP/IP. Show all posts
Sunday, January 10, 2010
Tuesday, December 29, 2009
Capture and Analyse Network Packets
tcpdump is the standard packet capturing facility available on most Linux systems, which is based on command line. Wireshark, formerly called Ethereal, is another popular packet capturing facility, free and GUI-based. Both tcpdump and Wireshark are based on pcap, so it is possible to combine them in capturing and analysing network packets, to take advantages of both.
For instance, I use the following tcpdump command to capture the traffic to and from www.google.com using http protocol:
sudo tcpdump -i wlan0 -w td.dat -nnvvXSs 1514 host www.google.com
Note:
sudo: It may require root privilege to capture packets.
-i wlan0: By default tcpdump captures packets on the eth0 interface. Since I am using wireless, I need to specify the wireless interface wlan0. When using VPN, the interface should be ppp0 instead usually.
-w td.dat: write all captured packets to the file td.dat.
-nn: no hostname and port resolving.
-vv: very verbose.
-X: print in both hex and ascii.
-S: absolute sequence.
-s 1514:
host www.google.com: this is the expression which says capturing packets whose dst host or src host is www.google.com.
See this tcpdump tutorial for more info about tcpdump usage.
Now Wireshark can be used to analyse the captured packets by tcpdump. Here Wireshark's GUI is exploited.
Use Wireshark to open td.dat, and apply the preset http filter. The http traffic can be easily browsed.
For instance, I use the following tcpdump command to capture the traffic to and from www.google.com using http protocol:
sudo tcpdump -i wlan0 -w td.dat -nnvvXSs 1514 host www.google.com
Note:
sudo: It may require root privilege to capture packets.
-i wlan0: By default tcpdump captures packets on the eth0 interface. Since I am using wireless, I need to specify the wireless interface wlan0. When using VPN, the interface should be ppp0 instead usually.
-w td.dat: write all captured packets to the file td.dat.
-nn: no hostname and port resolving.
-vv: very verbose.
-X: print in both hex and ascii.
-S: absolute sequence.
-s 1514:
tcpdump takes the first 68 bytes of data from a packet by default. Here the first 1514 bytes are taken.host www.google.com: this is the expression which says capturing packets whose dst host or src host is www.google.com.
See this tcpdump tutorial for more info about tcpdump usage.
Now Wireshark can be used to analyse the captured packets by tcpdump. Here Wireshark's GUI is exploited.
Use Wireshark to open td.dat, and apply the preset http filter. The http traffic can be easily browsed.
Subscribe to:
Posts (Atom)