Note that things look much healthier when I switch to wired ethernet
(e1000g0):
$ pfexec tshark -i e1000g0
Capturing on e1000g0
0.000000 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
0.000352 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
0.002498 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
0.003038 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
0.003039 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
0.003404 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
0.004236 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
0.004647 Riverdel_cc:c6:50 -> Broadcast ARP Who has
94.208.30.205? Tell 94.208.24.1
^C8 packets captured
Or something like this (from tshark this time)
18.193832 212.54.40.25 -> 83.81.185.108 DNS Standard query response
CNAME wildcard.addthiscdn.com.edgekey.net CNAME e1303.c.akamaiedge.net A
88.221.49.115
18.194094 83.81.185.108 -> 88.221.49.115 TCP 37488 > http [SYN] Seq=0
Win=64240 Len=0 MSS=1460 TSV=1190171 TSER=0 WS=1
18.218650 88.221.49.115 -> 83.81.185.108 TCP http > 37488 [SYN, ACK]
Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 TSV=1310561237 TSER=1190171 WS=1
18.218702 83.81.185.108 -> 88.221.49.115 TCP 37488 > http [ACK] Seq=1
Ack=1 Win=128872 Len=0 TSV=1190173 TSER=1310561237
18.218757 83.81.185.108 -> 88.221.49.115 HTTP GET
/live/t00/250lo.gif?uid=4a34dffb4c559833&7oa0a7&CXNID=2000001.5215456080540439072NXC&pub=sfnet&dr=sourceforge.net%2Ftracker%2F&rev=73511&jsl=1
HTTP/1.1
18.230822 83.81.185.108 -> 88.221.187.172 TCP 40399 > http [ACK]
Seq=1632 Ack=753 Win=128872 Len=0 TSV=1190175 TSER=1291061457
18.243594 88.221.49.115 -> 83.81.185.108 TCP http > 37488 [ACK] Seq=1
Ack=718 Win=7170 Len=0 TSV=1310561261 TSER=1190173
18.243651 88.221.49.115 -> 83.81.185.108 HTTP HTTP/1.1 200 OK (GIF89a)
18.243672 83.81.185.108 -> 88.221.49.115 TCP 37488 > http [ACK]
Seq=718 Ack=390 Win=128872 Len=0 TSV=1190176 TSER=1310561261
$ pfexec tcpdump -v -X -s 1536 -c 3 -i e1000g0
tcpdump: listening on e1000g0, link-type EN10MB (Ethernet), capture size
1536 bytes
12:02:01.238284 IP (tos 0x60, ttl 239, id 1901, offset 0, flags [none],
proto TCP (6), length 40)
66.179.5.20.80 > 5351B737.cable.casema.nl.34265: Flags [F.], cksum
0x20d4 (correct), seq 2454868347, ack 3020619439, win 8190, length 0
0x0000: 4560 0028 076d 0000 ef06 71b3 42b3 0514 E`.(.m....q.B...
0x0010: 5351 b737 0050 85d9 9252 517b b40a feaf SQ.7.P...RQ{....
0x0020: 5011 1ffe 20d4 0000 0000 7ef0 2fb5 P.........~./.
12:02:01.691807 IP (tos 0x0, ttl 255, id 3912, offset 0, flags [none],
proto UDP (17), length 70)
5351B96C.cable.casema.nl.48181 > dns.tb.iss.as9143.net.domain:
5100+ PTR? 20.5.179.66.in-addr.arpa. (42)
0x0000: 4500 0046 0f48 0000 ff11 a351 5351 b96c E..F.H.....QSQ.l
0x0010: d436 2819 bc35 0035 0032 0a33 13ec 0100 .6(..5.5.2.3....
0x0020: 0001 0000 0000 0000 0232 3001 3503 3137 .........20.5.17
0x0030: 3902 3636 0769 6e2d 6164 6472 0461 7270 9.66.in-addr.arp
0x0040: 6100 000c 0001 a.....
12:02:01.902419 IP (tos 0x0, ttl 59, id 0, offset 0, flags [DF], proto
UDP (17), length 161)
dns.tb.iss.as9143.net.domain > 5351B96C.cable.casema.nl.48181: 5100
NXDomain 1/1/0 20.5.179.66.in-addr.arpa. CNAME
20.0-25.5.179.66.in-addr.arpa. (133)
0x0000: 4500 00a1 0000 4000 3b11 363f d436 2819 e.....@.;.6?.6(.
0x0010: 5351 b96c 0035 bc35 008d e487 13ec 8183 SQ.l.5.5........
0x0020: 0001 0001 0001 0000 0232 3001 3503 3137 .........20.5.17
0x0030: 3902 3636 0769 6e2d 6164 6472 0461 7270 9.66.in-addr.arp
0x0040: 6100 000c 0001 c00c 0005 0001 0000 3840 a.............8@
0x0050: 000a 0232 3004 302d 3235 c00f c039 0006 ...20.0-25...9..
0x0060: 0001 0000 0e10 0039 036e 7331 0669 6e66 .......9.ns1.inf
0x0070: 6c6f 7703 6e65 7400 0364 6e73 0b63 6f72 low.net..dns.cor
0x0080: 656d 6574 7269 6373 0363 6f6d 0077 ce5c emetrics.com.w.\
0x0090: 8200 0004 b000 0000 b400 1275 0000 000e ...........u....
0x00a0: 10 .
3 packets captured
17 packets received by filter
0 packets dropped by kernel
On 02/ 3/10 11:23 AM, Darren Reed wrote:
Rather than the usual 14 bytes, you've got 18 bytes prepended to your
IP packets.
The confusing part is the 2 bytes in front of the MAC addresses and
the 2 bytes between the MAC addresses and the ethernet type.
These all appear to be broadcast packets of one type or another.
Antoon Huiskens wrote:
$ pfexec tcpdump -v -X -s 1536 -c 3 -i iwk0 tcpdump: listening on
iwk0, link-type EN10MB (Ethernet), capture size 1536 bytes
13:00:08.382924 ff:ff:ff:ff:00:0b (oui Unknown) > 08:22:00:00:ff:ff
(oui Unknown), ethertype Unknown (0x0e9e), length 110: 0x0000:
4340 001d e019 ead1 7054 aaaa 0300 0000 [email protected]......
0x0010: 0800 4500 004e 7c19 0000 8011 c689 0a00 ..E..N|.........
0x0020: e3fc 0a00 ffff 0089 0089 003a f94c 87a1 ...........:.L..
0x0030: 0110 0001 0000 0000 0000 2046 4446 4645 ...........FDFFE
0x0040: 4f43 4e45 4244 4644 4a44 4145 4444 4845 OCNEBDFDJDAEDDHE
0x0050: 4345 4344 4945 4745 4341 4100 0020 0001 CECDIEGECAA.....
13:00:08.383053 ff:ff:ff:ff:00:0b (oui Unknown) > 08:02:00:00:ff:ff
(oui Unknown), ethertype Unknown (0x0e9e), length 110: 0x0000:
4340 001f 3bc0 37bd 8054 aaaa 0300 0000 c...@..;.7..T......
0x0010: 0800 4500 004e 0071 0000 8011 3266 0a00 ..E..N.q....2f..
0x0020: f3c8 0a00 ffff 0089 0089 003a 2f19 8013 ...........:/...
0x0030: 0110 0001 0000 0000 0000 2045 4a46 4445 ...........EJFDE
0x0040: 4246 4545 4246 4143 4143 4143 4143 4143 BFEEBFACACACACAC
0x0050: 4143 4143 4143 4143 4141 4100 0020 0001 ACACACACAAA.....
13:00:08.485307 00:00:00:02:00:0b (oui Ethernet) > 08:02:00:00:33:33
(oui Unknown), ethertype Unknown (0x0e9e), length 88: 0x0000:
4340 001f 5bbe 892b a054 aaaa 0300 0000 c...@..[..+.t......
0x0010: 86dd 6000 0000 0010 3aff fe80 0000 0000 ..`.....:.......
0x0020: 0000 021f 5bff febe 892b ff02 0000 0000 ....[....+......
0x0030: 0000 0000 0000 0000 0002 8500 b11c 0000 ................
0x0040: 0000 0101 001f 5bbe 892b ......[..+
_______________________________________________
networking-discuss mailing list
[email protected]