mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-11-18 00:21:25 +01:00
127 lines
3.7 KiB
Plaintext
127 lines
3.7 KiB
Plaintext
|
Tue Dec 27 06:24:24 PST 1988
|
||
|
|
||
|
Traceroute is a system administrators utility to trace the route
|
||
|
ip packets from the current system take in getting to some
|
||
|
destination system. See the comments at the front of the
|
||
|
program for a description of its use.
|
||
|
|
||
|
This program
|
||
|
|
||
|
a) can only be run by root (it uses raw ip sockets).
|
||
|
|
||
|
b) REQUIRES A KERNEL MOD to the raw ip output code to run.
|
||
|
|
||
|
If you want to hack on your kernel, my modified version of the
|
||
|
routine rip_output (in file /sys/netinet/raw_ip.c) is attached.
|
||
|
This code may or may not resemble the code in your kernel.
|
||
|
It may offer you a place to start but I make no promises.
|
||
|
If you do hack your kernel, remember to test everything that uses
|
||
|
raw ip sockets (e.g., ping and egpup/gated) & make sure they still
|
||
|
work. I wish you the best of luck and you're on your own.
|
||
|
|
||
|
If your system has the ttl bug mentioned in the source, you
|
||
|
might want to fix it while you're in the kernel. (This bug
|
||
|
appears in all releases of BSD up to but not including 4.3tahoe.
|
||
|
If your version of netinet/ip_icmp.c is any earlier than 7.3
|
||
|
(April, '87), it has the bug.) The fix is just to add the line
|
||
|
ip->ip_ttl = MAXTTL;
|
||
|
after the line
|
||
|
ip->ip_src = t;
|
||
|
(or anywhere before the call to icmp_send) in routine icmp_reflect.
|
||
|
|
||
|
If you're running this on a pre-4.3bsd system (e.g., Sun 3.x,
|
||
|
Ultrix) that strips ip headers from icmp messages, add -DARCHAIC
|
||
|
to CFLAGS in the Makefile. Also note that rip_output contains
|
||
|
a conditional for a 4.2/4.3 change in the location of a raw
|
||
|
socket's protocol number. I've checked this under 4.3 & Sun OS
|
||
|
3.5 but you should double-check your system to make sure the
|
||
|
appropriate branch of the #if is taken (check the line that
|
||
|
assigned to ip->ip_p in your system's original rip_output).
|
||
|
|
||
|
A couple of awk programs to massage the traceroute output are
|
||
|
included. "mean.awk" and "median.awk" compute the mean and median
|
||
|
time to each hop, respectively. I've found that something like
|
||
|
|
||
|
traceroute -q 7 foo.somewhere >t
|
||
|
awk -f median.awk t | graph
|
||
|
|
||
|
can give you a quick picture of the bad spots on a long
|
||
|
path (median is usually a better noise filter than mean).
|
||
|
|
||
|
Enjoy.
|
||
|
|
||
|
- Van Jacobson (van@helios.ee.lbl.gov)
|
||
|
|
||
|
-------------------- rip_output from /sys/netinet/raw_ip.c
|
||
|
rip_output(m, so)
|
||
|
register struct mbuf *m;
|
||
|
struct socket *so;
|
||
|
{
|
||
|
register struct ip *ip;
|
||
|
int error;
|
||
|
struct rawcb *rp = sotorawcb(so);
|
||
|
struct sockaddr_in *sin;
|
||
|
#if BSD>=43
|
||
|
short proto = rp->rcb_proto.sp_protocol;
|
||
|
#else
|
||
|
short proto = so->so_proto->pr_protocol;
|
||
|
#endif
|
||
|
/*
|
||
|
* if the protocol is IPPROTO_RAW, the user handed us a
|
||
|
* complete IP packet. Otherwise, allocate an mbuf for a
|
||
|
* header and fill it in as needed.
|
||
|
*/
|
||
|
if (proto != IPPROTO_RAW) {
|
||
|
/*
|
||
|
* Calculate data length and get an mbuf
|
||
|
* for IP header.
|
||
|
*/
|
||
|
int len = 0;
|
||
|
struct mbuf *m0;
|
||
|
|
||
|
for (m0 = m; m; m = m->m_next)
|
||
|
len += m->m_len;
|
||
|
|
||
|
m = m_get(M_DONTWAIT, MT_HEADER);
|
||
|
if (m == 0) {
|
||
|
m = m0;
|
||
|
error = ENOBUFS;
|
||
|
goto bad;
|
||
|
}
|
||
|
m->m_off = MMAXOFF - sizeof(struct ip);
|
||
|
m->m_len = sizeof(struct ip);
|
||
|
m->m_next = m0;
|
||
|
|
||
|
ip = mtod(m, struct ip *);
|
||
|
ip->ip_tos = 0;
|
||
|
ip->ip_off = 0;
|
||
|
ip->ip_p = proto;
|
||
|
ip->ip_len = sizeof(struct ip) + len;
|
||
|
ip->ip_ttl = MAXTTL;
|
||
|
} else
|
||
|
ip = mtod(m, struct ip *);
|
||
|
|
||
|
if (rp->rcb_flags & RAW_LADDR) {
|
||
|
sin = (struct sockaddr_in *)&rp->rcb_laddr;
|
||
|
if (sin->sin_family != AF_INET) {
|
||
|
error = EAFNOSUPPORT;
|
||
|
goto bad;
|
||
|
}
|
||
|
ip->ip_src.s_addr = sin->sin_addr.s_addr;
|
||
|
} else
|
||
|
ip->ip_src.s_addr = 0;
|
||
|
|
||
|
ip->ip_dst = ((struct sockaddr_in *)&rp->rcb_faddr)->sin_addr;
|
||
|
|
||
|
#if BSD>=43
|
||
|
return (ip_output(m, rp->rcb_options, &rp->rcb_route,
|
||
|
(so->so_options & SO_DONTROUTE) | IP_ALLOWBROADCAST));
|
||
|
#else
|
||
|
return (ip_output(m, (struct mbuf *)0, &rp->rcb_route,
|
||
|
(so->so_options & SO_DONTROUTE) | IP_ALLOWBROADCAST));
|
||
|
#endif
|
||
|
bad:
|
||
|
m_freem(m);
|
||
|
return (error);
|
||
|
}
|