Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
1.0 Introduction
Purpose
Thepurposeofthispaperisdemonstratehowtomonitorandtroubleshootcommonnetworkbasedapplications
[Link]/IPstackandEthernet
hardwareisassumed.
PacketCapture/SniffingtheWire
Promiscuousmodeisgenerallyusedtorefertothepracticeofputtinganetworkcardintoasettingsothatit
[Link]
[Link]
onlymonitortraffictoandfromothernodeswithinthesamecollisiondomain(forEthernetandWirelessLAN)
orring(forTokenRingorFDDI),whichiswhynetworkswitchesareusedtocombatmalicioususeof
[Link]
[Link],tcpdump,andAirSnort(forwirelessLANs)
[Link]
FTPandTelnettransferdataandpasswordsincleartext,withoutencryption,andnetworkscannerscanseethis
[Link],computerusersareencouragedtostayawayfromprogramsliketelnetandusemoresecure
onessuchasSSH.
2.0 libpcap Based Tools
[Link]
[Link],allutilities
[Link]
tcpdumpandethereal.
2.1ThetcpdumpUtility
[Link]
[Link]:
box:~#tcpdump
tcpdump:WARNING:eth0:noIPv4addressassigned
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth0,linktypeEN10MB(Ethernet),capturesize96bytes
[Link],theispecifiesanotherEthernet
interfacebesidesthedefault(eth0).Alsoincludedisthenoptionwhichturnsofhostandportresolution.
ThetcpdumputilitywillattempttoresolveIPaddress,whichcanleadtosignificantdelaysinoutputduetothe
[Link]
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
traffic.
box:~#tcpdumpnieth1
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].935554IP192.168.1.105.32783>[Link].993:P3432387228:3432387265(37)
ack2742259796win63712<nop,nop,timestamp2396751064682926>
[Link].967508IP67.[Link]>[Link].32783:P1:54(53)ack37win1984
<nop,nop,timestamp1064879093239675>
Hereisabreakdownofasinglepacket:
RealTime:
SourceIPAddress:
DirectionofPacketFlow:
DestinationAddress:
TCPFlags:
TCPSourceSYNNumber:
NextTCPSYNNumber
TCPACKNUMBER:
TCPWindowSize:
TCPOptions:
[Link].967508
IP67.[Link]
>
[Link].32783:
P
1:
54(53)#originalSYN(1)+payload(53)=nextSYN(54)
ack37
win1984
<nop,nop,timestamp1064879093239675>
Ifthevolumeoftraffictobemonitoredistoogreatforastandardterminalwindowbuffer,thecapturedpackets
canbewrittentoafileinsteadofSTDOUTwithaw(write)optionandthenreadbackinwithar(read)
option.
box:~#tcpdumpw/tmp/tcp.outnieth1
tcpdump:listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
46packetscaptured
46packetsreceivedbyfilter
0packetsdroppedbykernel
box:~#tcpdumpr/tmp/tcp.outnieth1
readingfromfile/tmp/[Link],linktypeEN10MB(Ethernet)
[Link].190888IP192.168.1.105.32783>[Link].993:P3432387731:3432387768(37)
ack2742260475win63712<nop,nop,timestamp2921001065283060>
[Link].227315IP67.[Link]>[Link].32783:P1:54(53)ack37win1984
<nop,nop,timestamp1065403449292100>
<<snip>>
2.2TheetherealUtility
Justliketcpdump,[Link].
[Link]
[Link],thisisbecausetheyusethesame
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
underlyinglibpcapengine.
box:~#tetherealw/tmp/ethereal.outnieth1
Capturingoneth1
0.327450192.168.1.105>67.110.253.165TLSApplicationData
0.36117567.110.253.165>192.168.1.105TLSApplicationData
0.361220192.168.1.105>67.110.253.165TCP32783>993[ACK]Seq=37Ack=53Win=63712
Len=0TSV=389797TSER=1066380554
0.363460192.168.1.105>67.110.253.165TLSApplicationData
0.41095167.110.253.165>192.168.1.105TLSApplicationData
box:~#tetherealr/tmp/[Link]
62.543822192.168.1.105>67.110.253.165TLSApplicationData
72.59333067.110.253.165>192.168.1.105TLSApplicationData
82.593375192.168.1.105>67.110.253.165TCP32783>imaps[ACK]Seq=37Ack=53
Win=63712Len=0TSV=412045TSER=1066603077
92.595989192.168.1.105>67.110.253.165TLSApplicationData
2.3ThedsniffUtility
Unlikethepreviouslymentionedutilities,[Link]
libpcapengine,[Link]
[Link]
captureandreplayallunencryptedsessionsincluding:FTP,telnet,SMTP,IMAP,[Link]
exampledemonstrateshowtousedsnifftoaudittelnetandftpsessions:
box:~#dsniffnieth1
dsniff:listeningoneth1
06/01/[Link]tcp192.168.1.105.32883>[Link].21(ftp)
USERdarren
PASSdarren$$$$
06/01/[Link]tcp192.168.1.105.32889>[Link].23(telnet)
darren
darren$$$$
ls
lsl
psef
exit
2.4ThesnortUtility
[Link],itattemptstomake
[Link],snortattemptstoidentifymalicioustraffic
[Link],snortuseslibpcapasthe
[Link].
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
box:~#snortieth1Ddusnortgsnortc/etc/snort/[Link]
[Link]
/var/log/snort/[Link]:
[root@targus~]#nmapp22sX192.168.1.105
Thisquestionableportscanofthesshport(22)isobfuscatedbythesX(Christmasscan)switch.
Hereistheoutputfromthealertfileonthehostrunningsnort:
box:~#tailf/var/log/snort/alert
[**][Link]SCANnmapXMAS[**]
[Classification:AttemptedInformationLeak][Priority:2]
06/[Link].813099192.168.1.220:37325>[Link]:22
TCPTTL:47TOS:0x0ID:15194IpLen:20DgmLen:40
**U*P**FSeq:0x82A00B2Ack:0x0Win:0x1000TcpLen:20UrgPtr:0x0
[Xref=>[Link]
3.0 Sun Solarissnoop Utility
SnoopisspecifictoSunMicrosystem'[Link],thereis
[Link],itisautilitythatputsyoursystemsinterface(s)in
[Link],sincesnoopusesit'sownpacketcapturelibrary,the
[Link]
(d)withnameresolutiondisabled(r).
pilate>snooprdhme0
Usingdevice/dev/hme(promiscuousmode)
[Link]>67.110.253.164TCPD=22S=32897Ack=1172114638Seq=1267082364Len=0
Win=11200Options=<nop,nop,tstamp663391727479722>
[Link]>66.27.208.74TCPD=32897S=22PushAck=1267082364Seq=1172114638
Len=208Win=47824Options=<nop,nop,tstamp727479725663391>
Likelibpcaputilities,snoopalsoenablestheredirectionofpacketstoafileinsteadofSTDOUT.
pilate>snoopo/tmp/snoop.outrdhme0
Usingdevice/dev/hme(promiscuousmode)
14
pilate>snoopi/tmp/[Link]
[Link]>pilateTCPD=22S=32897
Ack=1172118318Seq=1267084668Len=0Win=15600Options=<nop,nop,tstamp670581727486912>
20.00005pilate>[Link]=32897S=22Push
Ack=1267084668Seq=1172118318Len=112Win=47824Options=<nop,nop,tstamp727486915670581>
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
4.0 Using Filter Expressions
[Link]
[Link]
[Link],boththe
[Link]
inallutilities,themostcommonfiltersarebyport,protocol,[Link]
telnettrafficandhost192.168.1.105:
[root@targus~]#tcpdumpnieth0port23andhost192.168.1.105
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth0,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].905262IP192.168.1.105.32899>[Link].telnet:S1903904803:1903904803(0)
win5840<mss1460,sackOK,timestamp7226130,nop,wscale0>
[root@targus~]#tetherealnieth0port23andhost192.168.1.105
Capturingoneth0
0.000000192.168.1.105>192.168.1.220TCP32900>23[SYN]Seq=0Ack=0Win=5840Len=0
MSS=1460TSV=729689TSER=0WS=0
box:~#dsniffnieth1port23andhost192.168.1.105
dsniff:listeningoneth1[port23andhost192.168.1.105]
06/01/[Link]tcp192.168.1.105.32901>[Link].23(telnet)
root
cangetin
pilate>snooprdhme0port53andhost192.168.1.105
[Link],a
[Link]
[Link]
sshcontroltraffictoandfromthecontrolconnection(192.168.1.105connectedto192.168.1.220asroot)and
allDNStraffic.
[root@targus~]#who
rootpts/2Jun121:30([Link])
[root@targus~]#tcpdumpnieth0nothost192.168.1.105andnotport53
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth0,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].692524IP216.93.214.50.51606>[Link].ssh:S2550704294:2550704294(0)
win5840<mss1460,sackOK,timestamp4316081200,nop,wscale2>
[Link].[Link]>[Link].51606:S729994889:729994889(0)ack
2550704295win5792<mss1460,sackOK,timestamp111008380431608120,nop,wscale2>
[Link].796911IP216.93.214.50.51606>[Link].ssh:.ack1win1460
<nop,nop,timestamp431608221111008380>
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
5.0 Protocol Layer Problems
5.1.0ARPLayerProblemsNoARPReply
[Link]
pinghangsornoreplyisreceived,[Link],
however,therecouldbemultipleissuesattheARPlayerpreventingaworkinghostfromcommunicatingonthe
[Link]
[Link]
fromthedestinationhost.
box:~#ping192.168.1.102
PING192.168.1.102([Link])56(84)bytesofdata.
64bytesfrom192.168.1.102:icmp_seq=1ttl=128time=5.83ms
box:~#tcpdumpnieth1arp
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].459856arpwhohas192.168.1.102tell192.168.1.105
[Link].462638arpreply192.168.1.102isat[Link]
[Link]
destinationhost([Link]).Thiscouldmeanthatthedestinationhostisnotonline.
box:~#ping192.168.1.107
PING192.168.1.107([Link])56(84)bytesofdata.
From192.168.1.105icmp_seq=1DestinationHostUnreachable
From192.168.1.105icmp_seq=2DestinationHostUnreachable
box:~#tcpdumpnieth1arp
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].995766arpwhohas192.168.1.107tell192.168.1.105
[Link].992668arpwhohas192.168.1.107tell192.168.1.105
[Link].992667arpwhohas192.168.1.107tell192.168.1.105
5.1.1ARPLayerProblemsDuplicateIPAddresses
WhentwohostshavethesameIPAddressassigned,therewillbetwoARPREPLYtotheARPREQUEST.
Thefirstreplyentersthesourcehost'[Link]
followingexampledemonstrateshowaWindowsXPandLINUXhostcompeteforthesameIPaddress.
Onthesurface,thepingmakesitappearthatthedestinationhost(expectedtobeLINUX)isupanresponding.
box:~#ping192.168.1.102
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
PING192.168.1.102([Link])56(84)bytesofdata.
64bytesfrom192.168.1.102:icmp_seq=1ttl=128time=5.83ms
However,[Link]
[Link]'sentrycameafter.
box:~#tcpdumpnieth1arp
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].074216arpwhohas192.168.1.102tell192.168.1.105
[Link].078448arpreply192.168.1.102isat[Link]#WindowsHost
[Link].079562arpreply192.168.1.102isat[Link]#LINUXHost
AcheckoftheARPcacheshowsthattheWindowsXPEthernetaddressistheonepopulatedinthecache.
box:~#arpa
targus([Link])at[Link][ether]oneth1
?([Link])at[Link][ether]oneth1
?([Link])at[Link][ether]oneth1
Anattempttousesshtoconnecttotheremotehostfailsbecausethesourcehostisattemptingtoconnecttothe
WindowsXPhostinsteadoftheLINUXhostusingtheWindowsXPEthernetaddress.
box:~#sshv192.168.1.102
OpenSSH_3.[Link].4,OpenSSL0.9.7e25Oct2004
debug1:Readingconfigurationdata/etc/ssh/ssh_config
debug1:Connectingto192.168.1.102[[Link]]port22.
^C
5.2.0IPProblemsMisconfiguredBroadcastAddress
[Link]
relyonaproperlyconfiguredbroadcastaddressincluding:NTP,RIPv1,[Link]
followingexampledemonstratesastandardICMPbroadcastpinganassociatedreply.
box:~#ifconfigeth1
eth1Linkencap:EthernetHWaddr[Link]
inetaddr:192.168.1.105Bcast:192.168.1.255Mask:[Link]
box:~#pingb192.168.1.255
WARNING:pingingbroadcastaddress
PING192.168.1.255([Link])56(84)bytesofdata.
64bytesfrom192.168.1.105:icmp_seq=1ttl=64time=0.052ms
64bytesfrom192.168.1.1:icmp_seq=1ttl=150time=3.54ms(DUP!)
64bytesfrom192.168.1.220:icmp_seq=1ttl=64time=4.43ms(DUP!)
Ifthebroadcastaddressisnotconsistentwiththerestofthehostsonthenetwork,noneofthosehostswillreply
[Link],[Link],thesource
hosthasamisconfigurednetmaskof255.0.0.0.
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
box:~#ifconfigeth1
eth1Linkencap:EthernetHWaddr[Link]
inetaddr:192.168.1.105Bcast:192.255.255.255Mask:[Link]
Abroadcastpingreturnsnorepliesfromthenetwork.
box:~#pingb192.168.1.255
PING192.168.1.255([Link])56(84)bytesofdata.
From192.168.1.105icmp_seq=1DestinationHostUnreachable
Apacketcapturefurtherconfirmstheproblem.Thecorrectbroadcastis192.168.1.255,howeversincethe
sourcehost'sbroadcastis192.255.255.255,thesourcehostismistakinglytryingtoARPfor192.168.1.255,
[Link]
havea.255init'slastoctet.
box:~#tcpdumpnieth1
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].512750arpwhohas192.168.1.255tell192.168.1.105
[Link].512665arpwhohas192.168.1.255tell192.168.1.105
5.2.1IPProblemsMisconfiguredDefaultGateway
WhenaclienthostonaLANcan'tcommunicatewiththeoutsideworld,itcanbeoneof4issues:
nonetworkconnectivity
misconfigured/etc/[Link]
misconfiguredornonexistent/etc/[Link]
misconfiguredorwronggatewayinformation
[Link]
[Link]
gatewayisroutingpackets.
TheclienthostisunabletoreachahostontheInternet.
box:~#[Link]
ping:[Link]
[Link],thereisnowaytotellwhetherthegatewayis
actuallyrouting.
box:~#netstatrn
KernelIProutingtable
DestinationGatewayGenmaskFlagsMSSWindowirttIface
[Link].0.0.0255.255.255.0U000eth1
0.0.0.0192.168.1.2200.0.0.0UG000eth1
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
[Link]
[Link],buttheinterfaceisNOTshowingthereturnpacket.
[root@targus~]#tcpdumpnieth0notport22
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth0,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].063347IP192.168.1.105.32770>[Link].domain:49762+A?[Link].(27)
[Link].075062IP192.168.1.105.32771>[Link].domain:49762+A?[Link].(27)
Fromtheclientprospective,therouterisonthenetworkasitrepliestoapingrequest.
box:~#ping192.168.1.220
PING192.168.1.220([Link])56(84)bytesofdata.
64bytesfrom192.168.1.220:icmp_seq=1ttl=64time=2.69ms
64bytesfrom192.168.1.220:icmp_seq=2ttl=64time=2.95ms
However,theclientisnotreceivinganyrepliesfromit'[Link],however
theyaregettingdropped.
box:~#tcpdumpnieth1notport22
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].367238IP192.168.1.105.32772>[Link].53:49099+A?[Link].(27)
[Link].381598IP192.168.1.105.32773>[Link].53:49099+A?[Link].(27)
5.2.0TCPProblemsClosedPorts
[Link]
beengiventotroubleshootattheEthernet,ARP,[Link]
isavailableattheIPlevel,itdoesnotmeanthatitisavailableattheTCPlevel.
ThehostisavailableattheIPlevelasperthepingreplies.
box:~#ping192.168.1.220
PING192.168.1.220([Link])56(84)bytesofdata.
64bytesfrom192.168.1.220:icmp_seq=1ttl=64time=2.71ms
64bytesfrom192.168.1.220:icmp_seq=2ttl=64time=2.64ms
Thetelnetserviceisnotavailabletotheclient.
box:~#telnet192.168.1.220
Trying192.168.1.220...
telnet:Unabletoconnecttoremotehost:Connectionrefused
2005 Darren Hoch - webmaster [at] [Link]
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
Takingalookatthepacketcapture,[Link]
closedportsistosendaresetflagtothesourcehost.
box:~#tcpdumpnieth1port23
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].495679IP192.168.1.105.32780>[Link].23:S2557844136:2557844136(0)win
5840<mss1460,sackOK,timestamp16439310,nop,wscale0>
[Link].498346IP192.[Link]>[Link].32780:R0:0(0)ack2557844137win0
5.2.1TCPProblemsTCPWrappedServices
[Link]
closedports,[Link],acheckismadetothe
/etc/[Link]/etc/[Link],thenastandardTCP
[Link],[Link]
wrappedsshservice.
box:~#ssh192.168.1.220
ssh_exchange_identification:Connectionclosedbyremotehost
Alookatthepacketcaptureshowsthatupondeterminingthattheclientisdenied,thesshserverinitiatesa
standardportclosingthroughaseriesofFINpacketexchanges.
box:~#tcpdumpnieth1port22
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].508208IP192.168.1.105.32786>[Link].22:S2304868053:2304868053(0)win
5840<mss1460,sackOK,timestamp20431320,nop,wscale0>
[Link].510770IP192.[Link]>[Link].32786:S762146323:762146323(0)ack
2304868054win5792<mss1460,sackOK,timestamp444552762043132,nop,wscale2>
[Link].510807IP192.168.1.105.32786>[Link].22:.ack1win5840
<nop,nop,timestamp204313244455276>
[Link].526296IP192.[Link]>[Link].3[Link](0)ack1win1448
<nop,nop,timestamp444602922043132>
[Link].526647IP192.168.1.105.32786>[Link].[Link](0)ack2win5840
<nop,nop,timestamp204363444460292>
[Link].529124IP192.[Link]>[Link].32786:.ack2win1448
<nop,nop,timestamp444602952043634>
5.2.2TCPProblemsPacketFilteredTCPPorts
Whenaportisblockedbyapacketfilter(IPTablesorIPFilterforexample),itmaybeopenbutfilteredattheIP
[Link],theclientwillsendmultipleSYNpacketstotheserverandtheserverwillnotrespondsimply
becausethepackethasbeendroppedbythefilter.
2005 Darren Hoch - webmaster [at] [Link]
10
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
box:~#telnet192.168.1.220
Trying192.168.1.220...
telnet:Unabletoconnecttoremotehost:Noroutetohost
Alookatthepacketcaptureshowsthattheclientsent3TCPSYNpacketstothetelnetport(23)thatwere
simplydroppedbytheserverandnotrepliedtointheclient.
box:~#tcpdumpnieth1port23
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth1,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].302120IP192.168.1.105.32787>[Link].23:S2934062463:2934062463(0)win
5840<mss1460,sackOK,timestamp21049120,nop,wscale0>
[Link].847729IP192.168.1.105.32788>[Link].23:S2951328215:2951328215(0)win
5840<mss1460,sackOK,timestamp21060660,nop,wscale0>
[Link].518837IP192.168.1.105.32789>[Link].23:S2947681121:2947681121(0)win
5840<mss1460,sackOK,timestamp21066330,nop,wscale0>
6.0 Application Layer Problems
6.1.0DHCPProblemsIPAddressalreadyassigned
[Link]
piecesthatcompriseaDHCPexchangebetweenaclientandaDHCPserver.
[root@targusdhcp]#tetherealnieth1notport22
4.4718020.0.0.0>255.255.255.255DHCPDHCPDiscoverTransactionID0x803fcf50
AftertheinitialDHCPDISCOVERmadebytheclient,theserversendsoutanARPrequesttothenetworktoseeif
anyotherhosthastakentheIPAddressfromtheDHCPpool.
4.4757[Link]>[Link]RPWhohas192.168.1.104?Tell
[Link]
IftherearenoARPreplies,[Link]
andtheDHCPserveracknowledgesthattheleaseisnowassigned.
5.135171192.168.1.1>255.255.255.255DHCPDHCPOfferTransactionID0x803fcf50
5.1354710.0.0.0>255.255.255.255DHCPDHCPRequestTransactionID0x803fcf50
5.139041192.168.1.1>255.255.255.255DHCPDHCPACKTransactionID0x803fcf50
Fromthispointon,[Link]
fromthenetworkandthentriestoreconnect,[Link]
followingpacketcapture,theclientrequestsit'soldIPaddressof192.168.1.104.
[root@targusdhcp]#tetherealnieth1notport22
Capturingoneth1
2005 Darren Hoch - webmaster [at] [Link]
11
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
4.4629230.0.0.0>255.255.255.255DHCPDHCPRequestTransactionID0x6ccda4f
TheDHCPserversentoutanARPrequestandreceivedavalidARPreplyfromanotherhost.
4.4657[Link]>[Link]RPWhohas192.168.1.104?Tell
[Link]
4.4657[Link]>[Link]RP192.168.1.104isat[Link]
4.467191192.168.1.1>192.168.1.104ICMP[MalformedPacket]
Therefore,theoldrequestedaddressof192.168.1.104isnolongeravailableandtheDHCPserversendsa
NAK(noacknowledgment)packetbacktotheclient,causingtheclienttostartatthebeginningwithaDHCP
DISCOVER.
4.471480192.168.1.1>255.255.255.255DHCPDHCPNAKTransactionID0x6ccda4f
6.1.1DHCPProblemsUsingDHCPforManualNetworkConfiguration
IftherearehardwareorsoftwareversionissuesthatpreventaclientfromnegotiatingaleasefromaDHCP
server,thenaNICcardcanbeconfiguredmanuallywithallthenetworkinginformationfromaDHCPACK
[Link]
includesallinformationneededtosuccessfullyconfigureaNICmanually.
[root@targus~]#ifconfigeth1up
[root@targus~]#ifupeth1
[root@targus~]#tetherealnVieth1portbootpc
Capturingoneth1
<<snip>>
Your(client)IPaddress:[Link]([Link])
NextserverIPaddress:[Link]([Link])
RelayagentIPaddress:[Link]([Link])
ClientMACaddress:00:40:f4:83:48:24(CameoCom_[Link])
Serverhostnamenotgiven
Bootfilenamenotgiven
Magiccookie:(OK)
Option53:DHCPMessageType=DHCPACK
Option1:SubnetMask=[Link]
Option3:Router=[Link]
Option6:DomainNameServer
IPAddress:[Link]
IPAddress:[Link]
IPAddress:[Link]
Option15:DomainName="[Link]"
Option51:IPAddressLeaseTime=1day
Option54:ServerIdentifier=[Link]
EndOption
Padding
2005 Darren Hoch - webmaster [at] [Link]
12
Network Troubleshooting Using Packet Capture Utilities UUASC 6/2/2005
6.1.2SambaProblemsUnabletoConnecttoSambaServer
TheSambaprotocol,oftenusedtonetworkWindowsclientstoUNIXservers,islargelyabroadcastprotocol.
WhenfailingtoconnectaWindowsbasedclienttoaUNIXserver,thereisnousefuldebugginginformation
[Link]
[Link]'tcommunicateoverSamba
[Link]([Link])isattemptingtodiscovertheserver
([Link]),however,bothhavedifferentbroadcastdomainsandthereforecan'thereeachother'srequests.
[root@targustmp]#tcpdumpnieth0notport22andnothost192.168.1.1
tcpdump:verboseoutputsuppressed,usevorvvforfullprotocoldecode
listeningoneth0,linktypeEN10MB(Ethernet),capturesize96bytes
[Link].[Link]>[Link].netbiosns:NBTUDPPACKET
(137):QUERY;REQUEST;BROADCAST
[Link].[Link]>[Link].netbiosns:NBTUDPPACKET
(137):QUERY;REQUEST;BROADCAST
[Link].[Link]>[Link].netbiosns:NBTUDPPACKET
(137):QUERY;REQUEST;BROADCAST
[Link].[Link]>[Link].netbiosns:NBTUDPPACKET
(137):QUERY;REQUEST;BROADCAST
[Link].[Link]>[Link].netbiosns:NBTUDPPACKET
(137):QUERY;REQUEST;BROADCAST
References
Thedsniffproject[Link]
Thesnooputility[Link]
Thetcpdump/libpcapproject[Link]
Thesnortproject[Link]
Theetherealproject[Link]
DHCPProtocol[Link]
SMBProtocol[Link]
2005 Darren Hoch - webmaster [at] [Link]
13