Home | History | Annotate | only in /external/tcpdump
Up to higher level directory
NameDateSize
.gitattributes22-Oct-2020573
aclocal.m422-Oct-202040.4K
addrtoname.c22-Oct-202032.8K
addrtoname.h22-Oct-20202.8K
addrtostr.c22-Oct-20205.6K
addrtostr.h22-Oct-20202K
af.c22-Oct-20202K
af.h22-Oct-20201.8K
ah.h22-Oct-20202.3K
Android.bp22-Oct-20205.1K
appletalk.h22-Oct-20204.1K
ascii_strcasecmp.c22-Oct-20203.5K
ascii_strcasecmp.h22-Oct-20201.5K
atime.awk22-Oct-2020529
atm.h22-Oct-20201.1K
bpf_dump.c22-Oct-20201.9K
CHANGES22-Oct-202056.8K
chdlc.h22-Oct-20201.3K
checksum.c22-Oct-20205.3K
CleanSpec.mk22-Oct-20202.2K
config.guess22-Oct-202042.3K
config.h22-Oct-202012K
config.h.in22-Oct-202011.5K
config.sub22-Oct-202035.2K
configure22-Oct-2020257.9K
configure.in22-Oct-202025.7K
CONTRIBUTING22-Oct-20205.9K
cpack.c22-Oct-20203.9K
cpack.h22-Oct-20202.4K
CREDITS22-Oct-202014.6K
ether.h22-Oct-20202.3K
ethertype.h22-Oct-20205.6K
extract.h22-Oct-202011.5K
funcattrs.h22-Oct-20204.4K
getopt_long.h22-Oct-20202.4K
gmpls.c22-Oct-20205.8K
gmpls.h22-Oct-20201.4K
gmt2local.c22-Oct-20202K
gmt2local.h22-Oct-20201.2K
in_cksum.c22-Oct-20206.4K
install-sh22-Oct-20205.4K
INSTALL.txt22-Oct-20205.2K
interface.h22-Oct-20202.3K
ip.h22-Oct-20205.7K
ip6.h22-Oct-20207.6K
ipproto.c22-Oct-202016.5K
ipproto.h22-Oct-20204.7K
l2vpn.c22-Oct-20203.4K
l2vpn.h22-Oct-2020781
lbl/22-Oct-2020
LICENSE22-Oct-2020873
llc.h22-Oct-20203.7K
machdep.c22-Oct-20202.6K
machdep.h22-Oct-20201.2K
Makefile-devel-adds22-Oct-2020614
Makefile.in22-Oct-202010K
makemib22-Oct-20206.4K
mib.h22-Oct-202026.3K
missing/22-Oct-2020
mkdep22-Oct-20202.4K
MODULE_LICENSE_BSD22-Oct-20200
mpls.h22-Oct-20201.9K
nameser.h22-Oct-202010.8K
netdissect-stdinc.h22-Oct-20209.9K
netdissect.c22-Oct-20203.4K
netdissect.h22-Oct-202030K
nfs.h22-Oct-202013.4K
nfsfh.h22-Oct-20202.6K
nlpid.c22-Oct-20201.3K
nlpid.h22-Oct-20201.3K
NOTICE22-Oct-2020873
openflow.h22-Oct-20202.1K
ospf.h22-Oct-202010.2K
oui.c22-Oct-20203.8K
oui.h22-Oct-20204.1K
OWNERS22-Oct-202046
packetdat.awk22-Oct-20201.4K
parsenfsfh.c22-Oct-202012.9K
pcap-missing.h22-Oct-20201.8K
pcap_dump_ftell.c22-Oct-20201.3K
PLATFORMS22-Oct-2020567
ppp.h22-Oct-20203.1K
print-802_11.c22-Oct-202091.2K
print-802_15_4.c22-Oct-20205.5K
print-ah.c22-Oct-20202K
print-ahcp.c22-Oct-202010.7K
print-aodv.c22-Oct-202016K
print-aoe.c22-Oct-202011.1K
print-ap1394.c22-Oct-20204K
print-arcnet.c22-Oct-20208.8K
print-arp.c22-Oct-202014.6K
print-ascii.c22-Oct-20206.2K
print-atalk.c22-Oct-202016.8K
print-atm.c22-Oct-202016.8K
print-babel.c22-Oct-202023.7K
print-beep.c22-Oct-20201.7K
print-bfd.c22-Oct-202016.2K
print-bgp.c22-Oct-202098.5K
print-bootp.c22-Oct-202030K
print-bt.c22-Oct-20202.2K
print-calm-fast.c22-Oct-20201.8K
print-carp.c22-Oct-20202.4K
print-cdp.c22-Oct-202011.2K
print-cfm.c22-Oct-202024.2K
print-chdlc.c22-Oct-20205.9K
print-cip.c22-Oct-20202.5K
print-cnfp.c22-Oct-202013.7K
print-dccp.c22-Oct-202016.4K
print-decnet.c22-Oct-202038.3K
print-dhcp6.c22-Oct-202023.2K
print-domain.c22-Oct-202018.3K
print-dtp.c22-Oct-20203K
print-dvmrp.c22-Oct-20208.9K
print-eap.c22-Oct-20209.3K
print-egp.c22-Oct-20208.7K
print-eigrp.c22-Oct-202019.3K
print-enc.c22-Oct-20204.2K
print-esp.c22-Oct-202020.3K
print-ether.c22-Oct-202012.9K
print-fddi.c22-Oct-202010.5K
print-forces.c22-Oct-202045K
print-fr.c22-Oct-202031.7K
print-frag6.c22-Oct-20202.4K
print-ftp.c22-Oct-2020973
print-geneve.c22-Oct-20206.1K
print-geonet.c22-Oct-20206.7K
print-gre.c22-Oct-20209.7K
print-hncp.c22-Oct-202026.2K
print-hsrp.c22-Oct-20204.6K
print-http.c22-Oct-20201.5K
print-icmp.c22-Oct-202022.6K
print-icmp6.c22-Oct-202059.6K
print-igmp.c22-Oct-202010.1K
print-igrp.c22-Oct-20204.6K
print-ip.c22-Oct-202016.9K
print-ip6.c22-Oct-202010.6K
print-ip6opts.c22-Oct-20205.5K
print-ipcomp.c22-Oct-20202.3K
print-ipfc.c22-Oct-20204.4K
print-ipnet.c22-Oct-20202.5K
print-ipx.c22-Oct-20206.4K
print-isakmp.c22-Oct-202081.7K
print-isoclns.c22-Oct-2020107.6K
print-juniper.c22-Oct-202048.3K
print-krb.c22-Oct-20206.3K
print-l2tp.c22-Oct-202025K
print-lane.c22-Oct-20203K
print-ldp.c22-Oct-202023.9K
print-lisp.c22-Oct-202015.2K
print-llc.c22-Oct-202016.7K
print-lldp.c22-Oct-202057.3K
print-lmp.c22-Oct-202037.6K
print-loopback.c22-Oct-20203.6K
print-lspping.c22-Oct-202051.6K
print-lwapp.c22-Oct-202013K
print-lwres.c22-Oct-202014.1K
print-m3ua.c22-Oct-202010.9K
print-medsa.c22-Oct-20205.6K
print-mobile.c22-Oct-20203.3K
print-mobility.c22-Oct-20209.7K
print-mpcp.c22-Oct-20207.9K
print-mpls.c22-Oct-20205.3K
print-mptcp.c22-Oct-202013.7K
print-msdp.c22-Oct-20202.7K
print-msnlb.c22-Oct-20202.4K
print-nflog.c22-Oct-20204.4K
print-nfs.c22-Oct-202042.8K
print-nsh.c22-Oct-20205.4K
print-ntp.c22-Oct-202013.3K
print-null.c22-Oct-20204K
print-olsr.c22-Oct-202023.4K
print-openflow-1.0.c22-Oct-202076.6K
print-openflow.c22-Oct-20204.8K
print-ospf.c22-Oct-202039.5K
print-ospf6.c22-Oct-202029.8K
print-otv.c22-Oct-20202.1K
print-pflog.c22-Oct-20204.8K
print-pgm.c22-Oct-202022.2K
print-pim.c22-Oct-202032.6K
print-pktap.c22-Oct-20205.2K
print-ppi.c22-Oct-20202.6K
print-ppp.c22-Oct-202046.2K
print-pppoe.c22-Oct-20205.7K
print-pptp.c22-Oct-202025.9K
print-radius.c22-Oct-202035.1K
print-raw.c22-Oct-20201.5K
print-resp.c22-Oct-202016.5K
print-rip.c22-Oct-20209.2K
print-ripng.c22-Oct-20206K
print-rpki-rtr.c22-Oct-202010.8K
print-rrcp.c22-Oct-20204.6K
print-rsvp.c22-Oct-202078.5K
print-rt6.c22-Oct-20202.7K
print-rtsp.c22-Oct-20201.2K
print-rx.c22-Oct-202066.9K
print-sctp.c22-Oct-202023.1K
print-sflow.c22-Oct-202031.5K
print-sip.c22-Oct-20201.3K
print-sl.c22-Oct-20206.6K
print-sll.c22-Oct-20208.9K
print-slow.c22-Oct-202025.2K
print-smb.c22-Oct-202042.9K
print-smtp.c22-Oct-2020983
print-snmp.c22-Oct-202043.2K
print-stp.c22-Oct-202017.2K
print-sunatm.c22-Oct-20203.3K
print-sunrpc.c22-Oct-20207.8K
print-symantec.c22-Oct-20203.8K
print-syslog.c22-Oct-20204K
print-tcp.c22-Oct-202035.5K
print-telnet.c22-Oct-202015K
print-tftp.c22-Oct-20205.2K
print-timed.c22-Oct-20204.7K
print-tipc.c22-Oct-202011.5K
print-token.c22-Oct-20208K
print-udld.c22-Oct-20205.5K
print-udp.c22-Oct-202021.3K
print-usb.c22-Oct-20204.2K
print-vjc.c22-Oct-20204.4K
print-vqp.c22-Oct-20206.8K
print-vrrp.c22-Oct-20206.3K
print-vtp.c22-Oct-202013.6K
print-vxlan-gpe.c22-Oct-20203.5K
print-vxlan.c22-Oct-20202.2K
print-wb.c22-Oct-202010.9K
print-zephyr.c22-Oct-20208K
print-zeromq.c22-Oct-20207.5K
print.c22-Oct-202011.5K
print.h22-Oct-20201.8K
README22-Oct-20209K
README.md22-Oct-20209K
README.version22-Oct-202093
Readme.Win3222-Oct-20201K
rpc_auth.h22-Oct-20202.7K
rpc_msg.h22-Oct-20203.2K
rpl.h22-Oct-20204.9K
send-ack.awk22-Oct-20201.6K
setsignal.c22-Oct-20203.3K
setsignal.h22-Oct-20201.2K
signature.c22-Oct-20205.6K
signature.h22-Oct-20201.1K
slcompress.h22-Oct-20203.6K
smb.h22-Oct-20205.4K
smbutil.c22-Oct-202062.9K
stime.awk22-Oct-2020567
strtoaddr.c22-Oct-20205.3K
strtoaddr.h22-Oct-2020992
tcp.h22-Oct-20205K
tcpdump.1.in22-Oct-202060.8K
tcpdump.c22-Oct-202068.3K
tests/22-Oct-2020
timeval-operations.h22-Oct-20203.2K
udp.h22-Oct-20208.3K
util-print.c22-Oct-202023.2K
VERSION22-Oct-20206
version.c22-Oct-202032
vfprintf.c22-Oct-20201.6K
win32/22-Oct-2020

README

      1 # tcpdump
      2 
      3 [![Build
      4 Status](https://travis-ci.org/the-tcpdump-group/tcpdump.png)](https://travis-ci.org/the-tcpdump-group/tcpdump)
      5 
      6 To report a security issue please send an e-mail to security (a] tcpdump.org.
      7 
      8 To report bugs and other problems, contribute patches, request a
      9 feature, provide generic feedback etc please see the file
     10 CONTRIBUTING in the tcpdump source tree root.
     11 
     12 TCPDUMP 4.x.y
     13 Now maintained by "The Tcpdump Group"
     14 See 		www.tcpdump.org
     15 
     16 Anonymous Git is available via:
     17 
     18 	git clone git://bpf.tcpdump.org/tcpdump
     19 
     20 formerly from 	Lawrence Berkeley National Laboratory
     21 		Network Research Group <tcpdump (a] ee.lbl.gov>  
     22 		ftp://ftp.ee.lbl.gov/old/tcpdump.tar.Z (3.4)
     23 
     24 This directory contains source code for tcpdump, a tool for network
     25 monitoring and data acquisition.  This software was originally
     26 developed by the Network Research Group at the Lawrence Berkeley
     27 National Laboratory.  The original distribution is available via
     28 anonymous ftp to `ftp.ee.lbl.gov`, in `tcpdump.tar.Z`.  More recent
     29 development is performed at tcpdump.org, http://www.tcpdump.org/
     30 
     31 Tcpdump uses libpcap, a system-independent interface for user-level
     32 packet capture.  Before building tcpdump, you must first retrieve and
     33 build libpcap, also originally from LBL and now being maintained by
     34 tcpdump.org; see http://www.tcpdump.org/ .
     35 
     36 Once libpcap is built (either install it or make sure it's in
     37 `../libpcap`), you can build tcpdump using the procedure in the `INSTALL.txt`
     38 file.
     39 
     40 The program is loosely based on SMI's "etherfind" although none of the
     41 etherfind code remains.  It was originally written by Van Jacobson as
     42 part of an ongoing research project to investigate and improve tcp and
     43 internet gateway performance.  The parts of the program originally
     44 taken from Sun's etherfind were later re-written by Steven McCanne of
     45 LBL.  To insure that there would be no vestige of proprietary code in
     46 tcpdump, Steve wrote these pieces from the specification given by the
     47 manual entry, with no access to the source of tcpdump or etherfind.
     48 
     49 Over the past few years, tcpdump has been steadily improved by the
     50 excellent contributions from the Internet community (just browse
     51 through the `CHANGES` file).  We are grateful for all the input.
     52 
     53 Richard Stevens gives an excellent treatment of the Internet protocols
     54 in his book *"TCP/IP Illustrated, Volume 1"*. If you want to learn more
     55 about tcpdump and how to interpret its output, pick up this book.
     56 
     57 Some tools for viewing and analyzing tcpdump trace files are available
     58 from the Internet Traffic Archive:
     59 
     60 * http://www.sigcomm.org/ITA/
     61 
     62 Another tool that tcpdump users might find useful is tcpslice:
     63 
     64 * https://github.com/the-tcpdump-group/tcpslice
     65 
     66 It is a program that can be used to extract portions of tcpdump binary
     67 trace files. See the above distribution for further details and
     68 documentation.
     69 
     70 Current versions can be found at www.tcpdump.org.
     71 
     72  - The TCPdump team
     73 
     74 original text by: Steve McCanne, Craig Leres, Van Jacobson
     75 
     76 -------------------------------------
     77 ```
     78 This directory also contains some short awk programs intended as
     79 examples of ways to reduce tcpdump data when you're tracking
     80 particular network problems:
     81 
     82 send-ack.awk
     83 	Simplifies the tcpdump trace for an ftp (or other unidirectional
     84 	tcp transfer).  Since we assume that one host only sends and
     85 	the other only acks, all address information is left off and
     86 	we just note if the packet is a "send" or an "ack".
     87 
     88 	There is one output line per line of the original trace.
     89 	Field 1 is the packet time in decimal seconds, relative
     90 	to the start of the conversation.  Field 2 is delta-time
     91 	from last packet.  Field 3 is packet type/direction.
     92 	"Send" means data going from sender to receiver, "ack"
     93 	means an ack going from the receiver to the sender.  A
     94 	preceding "*" indicates that the data is a retransmission.
     95 	A preceding "-" indicates a hole in the sequence space
     96 	(i.e., missing packet(s)), a "#" means an odd-size (not max
     97 	seg size) packet.  Field 4 has the packet flags
     98 	(same format as raw trace).  Field 5 is the sequence
     99 	number (start seq. num for sender, next expected seq number
    100 	for acks).  The number in parens following an ack is
    101 	the delta-time from the first send of the packet to the
    102 	ack.  A number in parens following a send is the
    103 	delta-time from the first send of the packet to the
    104 	current send (on duplicate packets only).  Duplicate
    105 	sends or acks have a number in square brackets showing
    106 	the number of duplicates so far.
    107 
    108 	Here is a short sample from near the start of an ftp:
    109 		3.00    0.20   send . 512
    110 		3.20    0.20    ack . 1024  (0.20)
    111 		3.20    0.00   send P 1024
    112 		3.40    0.20    ack . 1536  (0.20)
    113 		3.80    0.40 * send . 0  (3.80) [2]
    114 		3.82    0.02 *  ack . 1536  (0.62) [2]
    115 	Three seconds into the conversation, bytes 512 through 1023
    116 	were sent.  200ms later they were acked.  Shortly thereafter
    117 	bytes 1024-1535 were sent and again acked after 200ms.
    118 	Then, for no apparent reason, 0-511 is retransmitted, 3.8
    119 	seconds after its initial send (the round trip time for this
    120 	ftp was 1sec, +-500ms).  Since the receiver is expecting
    121 	1536, 1536 is re-acked when 0 arrives.
    122 
    123 packetdat.awk
    124 	Computes chunk summary data for an ftp (or similar
    125 	unidirectional tcp transfer). [A "chunk" refers to
    126 	a chunk of the sequence space -- essentially the packet
    127 	sequence number divided by the max segment size.]
    128 
    129 	A summary line is printed showing the number of chunks,
    130 	the number of packets it took to send that many chunks
    131 	(if there are no lost or duplicated packets, the number
    132 	of packets should equal the number of chunks) and the
    133 	number of acks.
    134 
    135 	Following the summary line is one line of information
    136 	per chunk.  The line contains eight fields:
    137 	   1 - the chunk number
    138 	   2 - the start sequence number for this chunk
    139 	   3 - time of first send
    140 	   4 - time of last send
    141 	   5 - time of first ack
    142 	   6 - time of last ack
    143 	   7 - number of times chunk was sent
    144 	   8 - number of times chunk was acked
    145 	(all times are in decimal seconds, relative to the start
    146 	of the conversation.)
    147 
    148 	As an example, here is the first part of the output for
    149 	an ftp trace:
    150 
    151 	# 134 chunks.  536 packets sent.  508 acks.
    152 	1       1       0.00    5.80    0.20    0.20    4       1
    153 	2       513     0.28    6.20    0.40    0.40    4       1
    154 	3       1025    1.16    6.32    1.20    1.20    4       1
    155 	4       1561    1.86    15.00   2.00    2.00    6       1
    156 	5       2049    2.16    15.44   2.20    2.20    5       1
    157 	6       2585    2.64    16.44   2.80    2.80    5       1
    158 	7       3073    3.00    16.66   3.20    3.20    4       1
    159 	8       3609    3.20    17.24   3.40    5.82    4       11
    160 	9       4097    6.02    6.58    6.20    6.80    2       5
    161 
    162 	This says that 134 chunks were transferred (about 70K
    163 	since the average packet size was 512 bytes).  It took
    164 	536 packets to transfer the data (i.e., on the average
    165 	each chunk was transmitted four times).  Looking at,
    166 	say, chunk 4, we see it represents the 512 bytes of
    167 	sequence space from 1561 to 2048.  It was first sent
    168 	1.86 seconds into the conversation.  It was last
    169 	sent 15 seconds into the conversation and was sent
    170 	a total of 6 times (i.e., it was retransmitted every
    171 	2 seconds on the average).  It was acked once, 140ms
    172 	after it first arrived.
    173 
    174 stime.awk
    175 atime.awk
    176 	Output one line per send or ack, respectively, in the form
    177 		<time> <seq. number>
    178 	where <time> is the time in seconds since the start of the
    179 	transfer and <seq. number> is the sequence number being sent
    180 	or acked.  I typically plot this data looking for suspicious
    181 	patterns.
    182 
    183 
    184 The problem I was looking at was the bulk-data-transfer
    185 throughput of medium delay network paths (1-6 sec.  round trip
    186 time) under typical DARPA Internet conditions.  The trace of the
    187 ftp transfer of a large file was used as the raw data source.
    188 The method was:
    189 
    190   - On a local host (but not the Sun running tcpdump), connect to
    191     the remote ftp.
    192 
    193   - On the monitor Sun, start the trace going.  E.g.,
    194       tcpdump host local-host and remote-host and port ftp-data >tracefile
    195 
    196   - On local, do either a get or put of a large file (~500KB),
    197     preferably to the null device (to minimize effects like
    198     closing the receive window while waiting for a disk write).
    199 
    200   - When transfer is finished, stop tcpdump.  Use awk to make up
    201     two files of summary data (maxsize is the maximum packet size,
    202     tracedata is the file of tcpdump tracedata):
    203       awk -f send-ack.awk packetsize=avgsize tracedata >sa
    204       awk -f packetdat.awk packetsize=avgsize tracedata >pd
    205 
    206   - While the summary data files are printing, take a look at
    207     how the transfer behaved:
    208       awk -f stime.awk tracedata | xgraph
    209     (90% of what you learn seems to happen in this step).
    210 
    211   - Do all of the above steps several times, both directions,
    212     at different times of day, with different protocol
    213     implementations on the other end.
    214 
    215   - Using one of the Unix data analysis packages (in my case,
    216     S and Gary Perlman's Unix|Stat), spend a few months staring
    217     at the data.
    218 
    219   - Change something in the local protocol implementation and
    220     redo the steps above.
    221 
    222   - Once a week, tell your funding agent that you're discovering
    223     wonderful things and you'll write up that research report
    224     "real soon now".
    225 ```
    226 

README.md

      1 # tcpdump
      2 
      3 [![Build
      4 Status](https://travis-ci.org/the-tcpdump-group/tcpdump.png)](https://travis-ci.org/the-tcpdump-group/tcpdump)
      5 
      6 To report a security issue please send an e-mail to security (a] tcpdump.org.
      7 
      8 To report bugs and other problems, contribute patches, request a
      9 feature, provide generic feedback etc please see the file
     10 CONTRIBUTING in the tcpdump source tree root.
     11 
     12 TCPDUMP 4.x.y
     13 Now maintained by "The Tcpdump Group"
     14 See 		www.tcpdump.org
     15 
     16 Anonymous Git is available via:
     17 
     18 	git clone git://bpf.tcpdump.org/tcpdump
     19 
     20 formerly from 	Lawrence Berkeley National Laboratory
     21 		Network Research Group <tcpdump (a] ee.lbl.gov>  
     22 		ftp://ftp.ee.lbl.gov/old/tcpdump.tar.Z (3.4)
     23 
     24 This directory contains source code for tcpdump, a tool for network
     25 monitoring and data acquisition.  This software was originally
     26 developed by the Network Research Group at the Lawrence Berkeley
     27 National Laboratory.  The original distribution is available via
     28 anonymous ftp to `ftp.ee.lbl.gov`, in `tcpdump.tar.Z`.  More recent
     29 development is performed at tcpdump.org, http://www.tcpdump.org/
     30 
     31 Tcpdump uses libpcap, a system-independent interface for user-level
     32 packet capture.  Before building tcpdump, you must first retrieve and
     33 build libpcap, also originally from LBL and now being maintained by
     34 tcpdump.org; see http://www.tcpdump.org/ .
     35 
     36 Once libpcap is built (either install it or make sure it's in
     37 `../libpcap`), you can build tcpdump using the procedure in the `INSTALL.txt`
     38 file.
     39 
     40 The program is loosely based on SMI's "etherfind" although none of the
     41 etherfind code remains.  It was originally written by Van Jacobson as
     42 part of an ongoing research project to investigate and improve tcp and
     43 internet gateway performance.  The parts of the program originally
     44 taken from Sun's etherfind were later re-written by Steven McCanne of
     45 LBL.  To insure that there would be no vestige of proprietary code in
     46 tcpdump, Steve wrote these pieces from the specification given by the
     47 manual entry, with no access to the source of tcpdump or etherfind.
     48 
     49 Over the past few years, tcpdump has been steadily improved by the
     50 excellent contributions from the Internet community (just browse
     51 through the `CHANGES` file).  We are grateful for all the input.
     52 
     53 Richard Stevens gives an excellent treatment of the Internet protocols
     54 in his book *"TCP/IP Illustrated, Volume 1"*. If you want to learn more
     55 about tcpdump and how to interpret its output, pick up this book.
     56 
     57 Some tools for viewing and analyzing tcpdump trace files are available
     58 from the Internet Traffic Archive:
     59 
     60 * http://www.sigcomm.org/ITA/
     61 
     62 Another tool that tcpdump users might find useful is tcpslice:
     63 
     64 * https://github.com/the-tcpdump-group/tcpslice
     65 
     66 It is a program that can be used to extract portions of tcpdump binary
     67 trace files. See the above distribution for further details and
     68 documentation.
     69 
     70 Current versions can be found at www.tcpdump.org.
     71 
     72  - The TCPdump team
     73 
     74 original text by: Steve McCanne, Craig Leres, Van Jacobson
     75 
     76 -------------------------------------
     77 ```
     78 This directory also contains some short awk programs intended as
     79 examples of ways to reduce tcpdump data when you're tracking
     80 particular network problems:
     81 
     82 send-ack.awk
     83 	Simplifies the tcpdump trace for an ftp (or other unidirectional
     84 	tcp transfer).  Since we assume that one host only sends and
     85 	the other only acks, all address information is left off and
     86 	we just note if the packet is a "send" or an "ack".
     87 
     88 	There is one output line per line of the original trace.
     89 	Field 1 is the packet time in decimal seconds, relative
     90 	to the start of the conversation.  Field 2 is delta-time
     91 	from last packet.  Field 3 is packet type/direction.
     92 	"Send" means data going from sender to receiver, "ack"
     93 	means an ack going from the receiver to the sender.  A
     94 	preceding "*" indicates that the data is a retransmission.
     95 	A preceding "-" indicates a hole in the sequence space
     96 	(i.e., missing packet(s)), a "#" means an odd-size (not max
     97 	seg size) packet.  Field 4 has the packet flags
     98 	(same format as raw trace).  Field 5 is the sequence
     99 	number (start seq. num for sender, next expected seq number
    100 	for acks).  The number in parens following an ack is
    101 	the delta-time from the first send of the packet to the
    102 	ack.  A number in parens following a send is the
    103 	delta-time from the first send of the packet to the
    104 	current send (on duplicate packets only).  Duplicate
    105 	sends or acks have a number in square brackets showing
    106 	the number of duplicates so far.
    107 
    108 	Here is a short sample from near the start of an ftp:
    109 		3.00    0.20   send . 512
    110 		3.20    0.20    ack . 1024  (0.20)
    111 		3.20    0.00   send P 1024
    112 		3.40    0.20    ack . 1536  (0.20)
    113 		3.80    0.40 * send . 0  (3.80) [2]
    114 		3.82    0.02 *  ack . 1536  (0.62) [2]
    115 	Three seconds into the conversation, bytes 512 through 1023
    116 	were sent.  200ms later they were acked.  Shortly thereafter
    117 	bytes 1024-1535 were sent and again acked after 200ms.
    118 	Then, for no apparent reason, 0-511 is retransmitted, 3.8
    119 	seconds after its initial send (the round trip time for this
    120 	ftp was 1sec, +-500ms).  Since the receiver is expecting
    121 	1536, 1536 is re-acked when 0 arrives.
    122 
    123 packetdat.awk
    124 	Computes chunk summary data for an ftp (or similar
    125 	unidirectional tcp transfer). [A "chunk" refers to
    126 	a chunk of the sequence space -- essentially the packet
    127 	sequence number divided by the max segment size.]
    128 
    129 	A summary line is printed showing the number of chunks,
    130 	the number of packets it took to send that many chunks
    131 	(if there are no lost or duplicated packets, the number
    132 	of packets should equal the number of chunks) and the
    133 	number of acks.
    134 
    135 	Following the summary line is one line of information
    136 	per chunk.  The line contains eight fields:
    137 	   1 - the chunk number
    138 	   2 - the start sequence number for this chunk
    139 	   3 - time of first send
    140 	   4 - time of last send
    141 	   5 - time of first ack
    142 	   6 - time of last ack
    143 	   7 - number of times chunk was sent
    144 	   8 - number of times chunk was acked
    145 	(all times are in decimal seconds, relative to the start
    146 	of the conversation.)
    147 
    148 	As an example, here is the first part of the output for
    149 	an ftp trace:
    150 
    151 	# 134 chunks.  536 packets sent.  508 acks.
    152 	1       1       0.00    5.80    0.20    0.20    4       1
    153 	2       513     0.28    6.20    0.40    0.40    4       1
    154 	3       1025    1.16    6.32    1.20    1.20    4       1
    155 	4       1561    1.86    15.00   2.00    2.00    6       1
    156 	5       2049    2.16    15.44   2.20    2.20    5       1
    157 	6       2585    2.64    16.44   2.80    2.80    5       1
    158 	7       3073    3.00    16.66   3.20    3.20    4       1
    159 	8       3609    3.20    17.24   3.40    5.82    4       11
    160 	9       4097    6.02    6.58    6.20    6.80    2       5
    161 
    162 	This says that 134 chunks were transferred (about 70K
    163 	since the average packet size was 512 bytes).  It took
    164 	536 packets to transfer the data (i.e., on the average
    165 	each chunk was transmitted four times).  Looking at,
    166 	say, chunk 4, we see it represents the 512 bytes of
    167 	sequence space from 1561 to 2048.  It was first sent
    168 	1.86 seconds into the conversation.  It was last
    169 	sent 15 seconds into the conversation and was sent
    170 	a total of 6 times (i.e., it was retransmitted every
    171 	2 seconds on the average).  It was acked once, 140ms
    172 	after it first arrived.
    173 
    174 stime.awk
    175 atime.awk
    176 	Output one line per send or ack, respectively, in the form
    177 		<time> <seq. number>
    178 	where <time> is the time in seconds since the start of the
    179 	transfer and <seq. number> is the sequence number being sent
    180 	or acked.  I typically plot this data looking for suspicious
    181 	patterns.
    182 
    183 
    184 The problem I was looking at was the bulk-data-transfer
    185 throughput of medium delay network paths (1-6 sec.  round trip
    186 time) under typical DARPA Internet conditions.  The trace of the
    187 ftp transfer of a large file was used as the raw data source.
    188 The method was:
    189 
    190   - On a local host (but not the Sun running tcpdump), connect to
    191     the remote ftp.
    192 
    193   - On the monitor Sun, start the trace going.  E.g.,
    194       tcpdump host local-host and remote-host and port ftp-data >tracefile
    195 
    196   - On local, do either a get or put of a large file (~500KB),
    197     preferably to the null device (to minimize effects like
    198     closing the receive window while waiting for a disk write).
    199 
    200   - When transfer is finished, stop tcpdump.  Use awk to make up
    201     two files of summary data (maxsize is the maximum packet size,
    202     tracedata is the file of tcpdump tracedata):
    203       awk -f send-ack.awk packetsize=avgsize tracedata >sa
    204       awk -f packetdat.awk packetsize=avgsize tracedata >pd
    205 
    206   - While the summary data files are printing, take a look at
    207     how the transfer behaved:
    208       awk -f stime.awk tracedata | xgraph
    209     (90% of what you learn seems to happen in this step).
    210 
    211   - Do all of the above steps several times, both directions,
    212     at different times of day, with different protocol
    213     implementations on the other end.
    214 
    215   - Using one of the Unix data analysis packages (in my case,
    216     S and Gary Perlman's Unix|Stat), spend a few months staring
    217     at the data.
    218 
    219   - Change something in the local protocol implementation and
    220     redo the steps above.
    221 
    222   - Once a week, tell your funding agent that you're discovering
    223     wonderful things and you'll write up that research report
    224     "real soon now".
    225 ```
    226 

README.version

      1 URL: http://www.tcpdump.org/release/tcpdump-4.9.2.tar.gz
      2 Version: 4.9.2
      3 BugComponent: 119452
      4