using: tcpdump 4.1.1 and libpcap 1.1.1
I tried to filter out my capture file trough tcpdump to display only the tcp connections between 1.1.1.1 to 2.2.2.2 (ips are just ie) by using the filter commands below:
tcpdump -r file.pcap src host 1.1.1.1 or dst host 1.1.1.1
and also
host 1.1.1.1
For some reason it only displays 1.1.1.1 host on the destination side (2.2.2.2 -> 1.1.1.1) and does keep the 1.1.1.1 on the source side. (1.1.1.1 -> 2.2.2.2)
I could not find this bug on this but I would appreciate if you culd point me if there is any work around for this bug. thanks
Can you provide a capture file that shows this behavior? I tried it on an Ethernet capture and it worked.
If you can't - for example, if you can't make the network traffic public - then:
1) On what type of network (Ethernet, 802.11, etc.) was the capture done?
2) On what version of what operating system was the capture done?
3) If it was done on a network that supports VLANs, such as an Ethernet, are VLANs being used on that network?
(Note that "on what ... was the capture done" asks about the machine on which you did the capture into the file.pcap file, not about the machine on which you're trying to read that file if the two machines are different.)
Hi,
Thanks for the comment. Unfortunately the captures are not publicly available due to information it contains.
1) Capture was done through Endace dag (d92x) card on Ethernet II.
2) Capture was done on Centos 5.4
3) VLANs are used onthe network but I tried vlan option on the sniff filter as well and didnt work..
Here is the packet info from Wireshark that might give you some more info you need (ip, mac and payload are changed to ???)
No. Time Source Destination Protocol Info
3031 0.612059 1.1.1.1 2.2.2.2 FIX OrderCancelReplaceRequest
Frame 3031 (315 bytes on wire, 315 bytes captured)
Arrival Time: Aug 4, 2010 09:39:51.472581000
[Time delta from previous captured frame: 0.000035000 seconds]
[Time delta from previous displayed frame: 0.612059000 seconds]
[Time since reference or first frame: 0.612059000 seconds]
Frame Number: 3031
Frame Length: 315 bytes
Capture Length: 315 bytes
[Frame is marked: False]
[Protocols in frame: eth:ip:tcp:fix]
[Coloring Rule Name: TCP]
[Coloring Rule String: tcp]
Ethernet II, Src: Cisco_ww: ?????, Dst: Cisco_ww: ?????
Destination: Cisco_d8 ?????
Address: Cisco_d8 ?????
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: Cisco_fd ?????
Address: Cisco_fd ?????
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Internet Protocol, Src: 1.1.1.1 (1.1.1.1), Dst: 2.2.2.2 (2.2.2.2)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 301
Identification: 0x153f (5439)
Flags: 0x02 (Don't Fragment)
0.. = Reserved bit: Not Set
.1. = Don't fragment: Set
..0 = More fragments: Not Set
Fragment offset: 0
Time to live: 127
Protocol: TCP (0x06)
Header checksum: 0x78da [correct]
[Good: True]
[Bad : False]
Source: 1.1.1.1 (1.1.1.1)
Destination: 2.2.2.2 (2.2.2.2)
Transmission Control Protocol, Src Port: embrace-dp-s (3197), Dst Port: 9855 (9855), Seq: 2094, Ack: 2491, Len: 261
Source port: embrace-dp-s (3197)
Destination port: 9855 (9855)
[Stream index: 14]
Sequence number: 2094 (relative sequence number)
[Next sequence number: 2355 (relative sequence number)]
Acknowledgement number: 2491 (relative ack number)
Header length: 20 bytes
Flags: 0x18 (PSH, ACK)
0... .... = Congestion Window Reduced (CWR): Not set
.0.. .... = ECN-Echo: Not set
..0. .... = Urgent: Not set
...1 .... = Acknowledgement: Set
.... 1... = Push: Set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 64289
Checksum: 0x8868 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 3027]
[The RTT to ACK the segment was: 0.000323000 seconds]
[Number of bytes in flight: 261]
[PDU Size: 261]
Thanks.
So that's one of the packets that "tcpdump host 1.1.1.1" *doesn't* print?
Correct.
Hi Guy,
Where you able to look in to this issue? Let me know if I can provide you with more info.
Administrators of the "libpcap" SourceForge project have superseded this tracker item (formerly artifact 3040174, now bug 139) with issue 141 of the "libpcap" GitHub project.