1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073
|
\input texinfo @c -*-texinfo-*-
@c %**start of header
@c
@c $Id: ipgrab.texi,v 1.23 2007/07/10 13:37:42 farooq-i-azam Exp $
@c
@setfilename ipgrab.info
@settitle IPgrab
@dircategory Networking
@c For double-sided printing, uncomment:
@c @setchapternewpage odd
@c %**end of header
@include version.texi
@iftex
@finalout
@end iftex
@ifinfo
@format
START-INFO-DIR-ENTRY
* IPgrab: (ipgrab). Verbose Packet Sniffer
END-INFO-DIR-ENTRY
@end format
IPgrab, verbose packet sniffer, by Mike Borella
This file documents the IPgrab packet sniffer.
Copyright (C) 1997-2007, Mike Borella
Permission is granted to make and distribute verbatim copies of
this manual provided the copyright notice and this permission notice
are preserved on all copies.
@ignore
Permission is granted to process this file through TeX and print the
results, provided the printed document carries copying permission
notice identical to this one except for the removal of this paragraph
(this paragraph not being relevant to the printed manual).
@end ignore
Permission is granted to copy and distribute modified versions of this
manual under the conditions for verbatim copying, provided that the entire
resulting derived work is distributed under the terms of a permission
notice identical to this one.
Permission is granted to copy and distribute translations of this manual
into another language, under the above conditions for modified versions,
except that this permission notice may be stated in a translation approved
by the Author.
@end ifinfo
@titlepage
@title IPgrab
@subtitle Verbose Packet Sniffer
@subtitle Edition @value{EDITION}, for IPgrab version @value{VERSION}
@subtitle @value{UPDATED}
@author Mike Borella
@page
@vskip 0pt plus 1filll
Copyright @copyright{} 1997-2002, Mike Borella
Permission is granted to make and distribute verbatim copies of
this manual provided the copyright notice and this permission notice
are preserved on all copies.
Permission is granted to copy and distribute modified versions of this
manual under the conditions for verbatim copying, provided that the entire
resulting derived work is distributed under the terms of a permission
notice identical to this one.
Permission is granted to copy and distribute translations of this manual
into another language, under the above conditions for modified versions,
except that this permission notice may be stated in a translation approved
by the Author.
@end titlepage
@c TABLE OF CONTENTS
@contents
@c Define an environment variable index.
@defcodeindex ev
@c Define an output variable index.
@defcodeindex ov
@c Define a CPP variable index.
@defcodeindex cv
@c Define a macro index that @@defmac doesn't write to.
@defcodeindex ma
@node Top, Introduction, (dir), (dir)
@comment node-name, next, previous, up
@ifinfo
This file documents IPgrab, a packet sniffer that allows rather verbose
description of network packets. This is edition @value{EDITION}, for
IPgrab version @value{VERSION}.
@end ifinfo
@c The master menu, created with texinfo-master-menu, goes here.
@menu
* Introduction:: Overview of IPgrab
* Guidelines for Use:: How to get the most out of IPgrab
* Status::
* History:: History of the project
* Index::
@end menu
@c CHAPTER
@node Introduction, Guidelines for Use, Top, Top
@chapter Introduction
You don't really understand networks until you've watched traffic on the
wire. I believe strongly in this statement. In fact, I believe in it
so strongly that I've been devleoping a packet sniffer so that all of us
can learn about networking this way.
A packet sniffer is an application layer program that interacts with one
or more layer two or layer three kernel modules or device drivers to
capture packets on a network. The lower-layer pieces read the packet
off the wire, copy it into memory, and provide an API for an application
to read it. An application, such as IPgrab, can do whatever it likes
with the resulting image of a packet. Packet sniffers have been used
for many years to detect network problems, troubleshoot protocols, and
detect intruders.
Traditionally, packet sniffers have displayed the captured packets in
brief, rather cryptic formats.
IPgrab is my humble attempt to make most, and eventually all, network
protocols readable. It currently supports a wide variety of IP-related
protocols, including some of the newer IP telephony protocols such as
SIP and MGCP, as well as IPv6. IPgrab also decodes basic IPX and NETBIOS
packets.
@cindex Contact info
The center of all IPgrab development, testing, and communication is
hosted on SourceForge at @uref{http://ipgrab.sourceforge.net/}. You may
mail suggestions and bug reports for to me at @email{mike@@borella.net}
or Muhammad Farooq-i-Azam @email{farooq@@chase.org.pk} who currently
helps coordination of development activites of the project.
@c CHAPTER
@node Guidelines for Use, Status, Introduction, Top
@chapter Guidelines for Use
IPgrab can be used in a number of ways, for a number of purposes. In
this section we provide a brief overview of IPgrab's two modes and its
command-line options.
@cindex Main mode
@section Main Mode
Main mode is the default mode for IPgrab output. It is extremely
verbose, displaying each field from all packet headers and protocols
that it understands across a separate line of text. Banners separate
different layers of protocol output. Single packets may require more
than 100 lines in order to be displayed. Main mode is most useful if
you need to know why or when a certain field or fields take on certain
values. Below is an example of main mode formatting of a TCP packet.
@example
**************************************************************************
Ethernet (990036574.132701)
--------------------------------------------------------------------------
Hardware source: 00:80:3e:57:b4:cf
Hardware destination: 01:00:5e:00:01:16
Type / Length: 0x800 (IP)
Media length: 192
--------------------------------------------------------------------------
IP Header
--------------------------------------------------------------------------
Version: 4
Header length: 5 (20 bytes)
TOS: 0x00
Total length: 178
Identification: 16
Fragmentation offset: 0
Unused bit: 0
Don't fragment bit: 0
More fragments bit: 0
Time to live: 29
Protocol: 17 (UDP)
Header checksum: 33315
Source address: 149.112.164.129
Destination address: 224.0.1.22
--------------------------------------------------------------------------
UDP Header
--------------------------------------------------------------------------
Source port: 1026 (unknown)
Destination port: 427 (SLP)
Length: 158
Checksum: 17593
--------------------------------------------------------------------------
SLPv1 Header
--------------------------------------------------------------------------
Version: 1
Operation: 1 (service request)
Length: 150
Flags/Reserved: 0x00
Dialect: 0
Language code: en
Character encoding: 1000
XID: 6365
@end example
In general, IPgrab does not attempt to "interpret" the values of a
packet. For example, the IP TOS field is displayed in its raw value of
0x00. If there is an interpretation or further explanation of a field,
IPgrab puts it in parenthesis following the raw value. For example, the
IP header lenght field is displayed in its raw form of 5 followed by an
interpretation of the number of bytes that this value represents.
Likewise, the TCP source port is 23, which IPgrab recognizes as the
telnet port.
Note that IPgrab adds a timestamp to the banner for each link layer packet.
@cindex Minimal mode
@section Minimal Mode
IPgrab also supports a minimal mode in which all information about all
parts of a packet are displayed in a single line of text. This line may
be longer than 80 characters and thus wrap around a standard terminal
window one or more times. Below is an example of minimal mode
formatting of a TCP packet.
@example
1 990038240.206509 | ETH 00:b0:d0:11:a4:d0->ff:ff:ff:ff:ff:ff | IP
149.112.90.171->149.112.90.255 (len:78,id:29629,frag:0) | UDP 137->137
| NETBIOS NS query 3-COM
@end example
Minimal mode begins with a number (in this case, the number 1 indicates
that this packet is the first one read) and a timestamp, and then parses
the packet from link layer to application layer. Each layer begins with
an abbreviation of the protocol being displayed (such as ETH, IP, and
UDP, above). These abbreviations are followed by only the most relevant
fields of the protocol. For example, IP source and destination
addresses are shown, along with the total length field and the DF bit
(if set) in parentheses. Likewise, UDP source and destination ports are
shown.
@cindex Command line options
@section Command Line Options
Both main mode and minimal mode output can be adjusted by specifying one
or more commend line options. In this section, we provide a complete
list of IPgrab's command line options and their use.
The usage of IPgrab is briefly described as follows.
@command{ipgrab [-blmnPprTtwx] [-c|--count n] [-h|--help] [-i|--interface
if] [BPF expr]}
The BPF expression is a string of terms that is acceptable to the
Berkeley Packet Filter. For more details on the BPF expression grammar,
see the tcpdump manual page.
@itemize @bullet
@item
@command{-a}. Don't display application layer data.
@item
@command{-b}. Turn off buffering of standard output (stdout) so that all
displaying occurs as soon as possible. Useful when IPgrab output is
being re-directed to a file.
@item
@command{-c n / --count n}. Terminate after reading and displaying the
first n packets.
@item
@command{-C proto / --CCP proto}. Assume a particular CCP protocol, such as
MPPC. MPPC is the only one supported today.
@item
@command{-d}. Dump extra padding in packets. For example, according to an
IP header, the packet ends at a certain point, but the link layer may
have padded it beyond that. This option displays the padding. Not valid
in minimal mode.
@item
@command{-h / --help}. Display usage screen with a brief description of
the command line options.
@item
@command{-i if / --interface if}. Makes IPgrab listen to packets on
interface if. If this option is not used, the default interface will be
assumed.
@item
@command{-l}. Don't display link layer headers. The following protocols
are considered to be link layer: ARP, CHAP, Ethernet, IPCP, LCP, LLC,
Loopback, PPP, PPPoE, Raw, Slip, .
@item
@command{-m}. Minimal mode output.
@item
@command{-n}. Don't display network layer headers. The following
protocols are considered to be network layer: AH, ESP, GRE, ICMP,
ICMPv6, IGMP, IP, IPv6, IPX, IPXRIP.
@item
@command{-P}. Initiate a dynamic port mapping. This option must be followed
by a string of the form `<protocol>=<port>', such as `rtp=6569'.
@item
@command{-p}. Dump packet payloads beyond what IPgrab parses. In other
words, if IPgrab doesn't parse a particular application, this option
will dump the application data in hex and text format.
@item
@command{-r}. Read packets from a file, rather than an interface. The
file should be created in "raw" format, such as with @option{-w} option.
@item
@command{-T}. Don't display timestamps in minimal mode.
@item
@command{-t}. Don't display transport layer headers. The following protocols
are considered to be transport layer: SPX, TCP, UDP.
@item
@command{-v}. Display version number then quit.
@item
@command{-w}. Write the raw packets to a file, rather than the screen.
The packets will not be parsed. The file can be read with the @option{-r}
option.
@item
@command{-x}. Hex dump mode. After processing each layer, dump out the
contents of that layer in hex and text. Only valid in main mode.
@end itemize
@section Examples
@itemize @bullet
@item Only ICMP packets will be displayed using main mode without link layer headers.
Command: @command{ipgrab -l icmp}
Output:
@example
**************************************************************************
IP Header
--------------------------------------------------------------------------
Version: 4
Header length: 5 (20 bytes)
TOS: 0x00
Total length: 84
Identification: 0
Fragmentation offset: 0
Unused bit: 0
Don't fragment bit: 1
More fragments bit: 0
Time to live: 64
Protocol: 1 (ICMP)
Header checksum: 42625
Source address: 149.112.90.225
Destination address: 198.147.221.66
--------------------------------------------------------------------------
ICMP Header
--------------------------------------------------------------------------
Type: 8 (echo request)
Code: 0
Checksum: 43361
Identifier: 15353
Sequence number: 0
@end example
@item Only packets arriving on interface eth1 with a source port of 21 (FTP) will be displayed in minimal mode.
Command: @command{ipgrab -i eth1 -m src port 21}
Output:
@example
1 990038936.642292 | ETH 00:80:3e:57:b4:cf->00:50:04:32:0e:8f | IP
198.147.221.66->149.112.90.225 (len:64,id:18353,DF,frag:0) | TCP 21->1047
(SA,3123051349,2290714856,9856) <timestamp 873976824 43310056><window
scale 0><SACK permitted><maximum segment size 1420>
@end example
@end itemize
@c CHAPTER
@node Status, History, Guidelines for Use, Top
@chapter Status of Protocol Modules
In this section we discuss the status of each of the protocol modules.
While some protocols may be fully supported and well tested, other modules
may only have partial support or may not have been tested fully.
@cindex Authentication Header
@cindex AH
@section Authentication Header (AH)
@itemize @bullet
@item Module: @command{ah.c}
@item Support: Full.
@item Maturity: Not tested.
@item Notes: AH typically appears between IP and TCP/UDP headers in order
to apply IPsec-based authentication.
@end itemize
@cindex Address Resolution Protocol
@cindex ARP
@cindex Reverse Address Resolution Protocol
@cindex RARP
@section Address Resolution Protocol (ARP)
@itemize @bullet
@item Module: @command{arp.c}
@item Support: Partial (only supports IP over Ethernet).
@item Maturity: Well tested.
@item Notes: Originally, ARP was defined to support address resolution of
network layer protocol x over link layer protocol y. Currently, IP over
Ethernet is by far the most used mode of ARP, and thus is the only one
supported.
@end itemize
@cindex Callback Control Protocol
@cindex CBCP
@section Callback Control Protocol (CBCP)
@itemize @bullet
@item Module: @command{cbcp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: This protocol runs over PPP and allows a client to request that
the server calls back. We only support very basic negotiation that is
seen in the Windows 2000 VPN client.
@end itemize
@cindex Compression Control Protocol
@cindex CCP
@section Compression Control Protocol (CBCP)
@itemize @bullet
@item Module: @command{ccp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: CCP negotiates a compression algorithm for PPP and its
associated parameters. Since the protocol used is stateful, we need a
hint in order to decode the header portion. Such a hint can be provided
the -C option (see above). However, this limits us to decoding only one
CCP-negotiated protocol at a time.
@end itemize
@cindex Challenge Handshake Authentication Protocol
@cindex CHAP
@section Challenge Handshake Authentication Protocol (CHAP)
@itemize @bullet
@item Module: @command{chap.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: CHAP authenticates the ends of a PPP session to one another.
@end itemize
@cindex Dynamic Host Configuration Protocol
@cindex DHCP
@section Dynamic Host Configuration Protocol (DHCP)
@itemize @bullet
@item Module: @command{dhcp.c}
@item Support: Partial (doesn't support all options).
@item Maturity: Well tested.
@item Notes: DHCP is an extensibly protocol with a large number of
officially sanctioned options, and a number of de facto options.
Currently we support many of the most common, but not all, of these
options.
@end itemize
@cindex Domain Name System
@cindex DNS
@section Domain Name System (DNS)
@itemize @bullet
@item Module: @command{dns.c}
@item Support: Partial (doesn't support all record types).
@item Maturity: Well tested.
@item Notes: Currently, we support records of type A, AAAA, CNAME, NS,
SOA, and PTR. Other record types, such as A6, MX, and SRV, are not
supported.
@end itemize
@cindex Encapsulating Security Payload
@cindex ESP
@section Encapsulating Security Payload (ESP)
@itemize @bullet
@item Module: @command{esp.c}
@item Support: Partial (doesn't decrypt packets nor decode ESP trailer).
@item Maturity: Not tested.
@item Notes: ESP typically appears between IP and TCP/UDP headers in order
to apply IPsec-based encryption and/or authentication. We do not
attempt to decode encrypted packets because this would require adding
state to IPgrab, which is something that we'd rather not do. This
prevents us from displaying the ESP trailer as well. As soon as an ESP
header is read and the plaintext portion is displayed, we halt
processing of the rest of the packet.
@end itemize
@cindex Ethernet
@section Ethernet
@itemize @bullet
@item Module: @command{ethernet.c}
@item Support: Full, expcept that not all Ethernet types are recognized,
and 802.1p and VLANs are not supported.
@item Maturity: Well tested.
@item Notes: Supported Ethernet types include IP, IPv6, PPP, ARP, RARP, and
IPX. LLC encapsulation is supported in the LLC module.
@end itemize
@cindex File Transfer Protocol: Control
@cindex FTP
@section File Transfer Protocol (FTP): Control
@itemize @bullet
@item Module: @command{ftpctrl.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes:
@end itemize
@cindex Generic Routing Encapsulation
@cindex GRE
@section Generic Routing Encapsulation
@itemize @bullet
@item Module: @command{gre.c}
@item Support: Full for versions 0 and 1.
@item Maturity: Well tested.
@item Notes: Version 1 is defined
in the PPTP RFC.
@end itemize
@cindex Hypertext Transfer Protocol
@cindex HTTP
@section Hypertext Transfer Protocol
@itemize @bullet
@item Module: @command{http.c}
@item Support: Full (displays only headers).
@item Maturity: Well tested.
@item Notes: Parses and displays HTTP headers only. The rest of the
payload is skipped.
@end itemize
@cindex Internet Control Message Protocol
@cindex ICMP
@section Internet Control Message Protocol
@itemize @bullet
@item Module: @command{icmp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Displays all ICMP types and codes, but does not parse specific
payloads for some lesser-used ICMP types, such as source quench, and
redirect. Also does not handle Mobile IP extensions (yet).
@end itemize
@cindex Internet Control Message Protocol Version 6
@cindex ICMPv6
@section Internet Control Message Protocol Version 6
@itemize @bullet
@item Module: @command{icmpv6.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Not all types and codes are explicitly parsed.
@end itemize
@cindex Internet Group Message Protocol
@cindex IGMP
@section Internet Group Message Protocol
@itemize @bullet
@item Module: @command{igmp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: IGMPv1 and v2 are supported. IGMPv3 is not tested and may not
be cleanly supported.
@end itemize
@cindex Internet Protocol
@cindex IP
@section Internet Protocol
@itemize @bullet
@item Module: @command{ip.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: Full support for the IP header and options. TOS/DS byte is not
interpreted in any particular fashion.
@end itemize
@cindex Internet Protocol Control Protocol
@cindex IP
@section Internet Protocol Control Protocol
@itemize @bullet
@item Module: @command{ipcp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Full support for common messages and options. Some options may
not be supported.
@end itemize
@cindex Internet Protocol Version 6
@cindex IPv6
@section Internet Protocol Version 6
@itemize @bullet
@item Module: @command{ipv6.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Full support for the IPv6 header, except that IPv6 addresses
are not displayed in the proper shorthand.
@end itemize
@cindex Internet Packet Exchange
@cindex IPX
@section Internet Packet Exchange
@itemize @bullet
@item Module: @command{ipx.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Full support for the IPX header, but not all transport protocols
and applications are supported, nor are the header fields interpretated as
well as they could be.
@end itemize
@cindex Internet Packet Exchange Routing Information Protocol
@cindex IPXRIP
@section Internet Packet Exchange Routing Information Protocol
@itemize @bullet
@item Module: @command{ipxrip.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Basic listing of the routes.
@end itemize
@cindex Internet Key Exchange
@cindex IKE
@section Internet Key Exchange
See Internet Security Association and Key Management Protocol.
@cindex Internet Security Association and Key Management Protocol
@cindex ISAKMP
@section Internet Security Association and Key Management Protocol
@itemize @bullet
@item Module: @command{isakmp.c}
@item Support: Partial.
@item Maturity: Well tested against Windows 2000 only.
@item Notes: Only the following ISAKMP headers are supported: delete, SA,
vendor ID, proposal, transform.
@end itemize
@cindex Layer 2 Tunneling Protocol
@cindex L2TP
@section Layer 2 Tunneling Protocol
@itemize @bullet
@item Module: @command{l2tp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Only the most common message types are supported.
@end itemize
@cindex Link Control Protocol
@cindex LCP
@section Link Control Protocol
@itemize @bullet
@item Module: @command{lcp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Not all NCPs are tested for.
@end itemize
@cindex Logical Link Control
@cindex LLC
@section Logical Link Control
@itemize @bullet
@item Module: @command{llc.c}
@item Support: Partial.
@item Maturity: Partially tested.
@item Notes: Some basic cases such as IP and IPX encapsulation work
reasonably well, but other common cases are not supported. Basically, this
module needs a re-write.
@end itemize
@cindex Loopback
@section Loopback
@itemize @bullet
@item Module: @command{loopback.c}
@item Support: Full.
@item Maturity: Fully tested.
@item Notes: Some loopback interfaces, Redhat Linux 6.2 for example,
present themselves as Ethernet interfaces, where all Ethernet addresses
are zeroed out. Strange but true.
@end itemize
@cindex Media Gateway Control Protocol
@cindex MGCP
@section Media Gateway Control Protocol
@itemize @bullet
@item Module: @command{mgcp.c}
@item Support: Partial.
@item Maturity: Not tested.
@item Notes: Use at your own risk.
@end itemize
@cindex Mobile IP
@cindex MIP
@section Mobile IP
@itemize @bullet
@item Module: @command{mobileip.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Not all extensions are supported. Support for the CDMA2000
A11 interface is also in this module. We support registration update and
registration acknowledgement, as well as some of the extensions.
@end itemize
@cindex Microsoft Point-to-Point Compression Protocol
@cindex MPPC
@section Microsoft Point-to-Point Compression Protocol (MPPC)
@itemize @bullet
@item Module: @command{mppc.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Since we are not guaranteed to know the compression state, we
are not able to decode the compressed section. We only decode the header.
In order to decode MPPC packets, "-C MPPC" must be specified on the command
line.
@end itemize
@cindex NETBIOS Name Service
@cindex NETBIOS
@section NETBIOS Name Service
@itemize @bullet
@item Module: @command{netbios_ns.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: DNS-like protocol for NETBIOS.
@end itemize
@cindex Network News Transfer Protocol
@cindex NNTP
@section Network News Transfer Protocol (NNTP)
@itemize @bullet
@item Module: @command{nntp.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: Just dumps the raw text of the messages, as that's all there is.
@end itemize
@cindex Open Shortest Path First
@cindex OSPF
@section Open Shortest Path First
@itemize @bullet
@item Module: @command{ospf.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Only hello messages are supported.
@end itemize
@cindex Point to Point Protocol
@cindex PPP
@section Point to Point Protocol
@itemize @bullet
@item Module: @command{ppp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Most systems will not let you sniff native PPP packets, as their
headers are usually stripped off before the kernel gives the packet to
the sniffer. However, when you use PPTP or L2TP, PPP is avilable to a
sniffer. Thus all testing was done using tunneling modes, rather than
native mode. Note that some tunnel configurations may fragment a single
incoming PPP frame into multiple tunneled packets. In this case, it is
not clear what ipgrab will do (probably something strange). We
currently do not decode HDLC-mode (control escape) PPP packets.
@end itemize
@cindex PPP Over Ethernet
@cindex PPPOE
@section PPP Over Ethernet
@itemize @bullet
@item Module: @command{pppoe.c}
@item Support: Full.
@item Maturity: Not tested.
@item Notes: This is a contributed module. I have not tested it, but the
contributor has.
@end itemize
@cindex Point to Point Tunneling Protocol
@cindex PPTP
@section Point to Point Tunneling Protocol
@itemize @bullet
@item Module: @command{pptp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Not all message types are supported, but the most common ones are.
@end itemize
@cindex RADIUS
@section RADIUS
@itemize @bullet
@item Module: @command{radius.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Most attributes from RFC 2865 and RFC 2866 are supported.
Additionally, most 3GPP2 vendor-specific attributes are supported.
@end itemize
@cindex Raw IP
@section Raw IP
@itemize @bullet
@item Module: @command{raw.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: This is a default datalink type for native IP. Since most
kernel don't let us look at native PPP frames, most packets on a PPP interface
will be interpreted as raw.
@end itemize
@cindex Routing Information Protocol
@cindex RIP
@section Routing Information Protocol
@itemize @bullet
@item Module: @command{rip.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: RIPv1 was tested extensively. RIPv2 was not tested.
@end itemize
@cindex Routing Information Protocol (Next Generation)
@cindex RIPng
@cindex RIPv6
@section Routing Information Protocol (Next Generation)
@itemize @bullet
@item Module: @command{ripng.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes:
@end itemize
@cindex Real Time Control Protocol
@cindex RTCP
@section Real Time Control Protocol (RTP)
@itemize @bullet
@item Module: @command{rtcp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: In order to use this module, you'll need to notify IPgrab of
proper port number on which to expect the RTP traffic. Use the
@command{-P} option to do this. IPgrab will assume that the next highest
port belongs to RTCP. Only sender reports, receiver reports and source
description packets.
@end itemize
@cindex Real Time Protocol
@cindex RTP
@section Real Time Protocol (RTP)
@itemize @bullet
@item Module: @command{rtp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: In order to use this module, you'll need to notify IPgrab of
proper port number on which to expect the RTP traffic. Use the @command{-P}
option to do this.
@end itemize
@cindex Session Description Protocol
@cindex SDP
@section Session Description Protocol
@itemize @bullet
@item Module: @command{sdp.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: Displays the headers in plain format with no interpretation.
Does not display anything in minimal mode.
@end itemize
@cindex Session Initiation Protocol
@cindex SIP
@section Session Initiation Protocol
@itemize @bullet
@item Module: @command{sip.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: Displays the headers in plain format with no interpretation.
@end itemize
@cindex Serial Line IP
@cindex SLIP
@section Serial Line IP
@itemize @bullet
@item Module: @command{slip.c}
@item Support: Full.
@item Maturity: Not tested.
@item Notes:
@end itemize
@cindex Service Location Protocol
@cindex SLP
@section Service Location Protocol
@itemize @bullet
@item Module: @command{slp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Only basic forms of version 1 are supported.
@end itemize
@cindex Simple Network Management Protocol
@cindex SNMP
@section Simple Network Management Protocol
@itemize @bullet
@item Module: @command{snmp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: This module only displays the most basic information about
captured SNMP packets. Very little functionality is supported.
@end itemize
@cindex Sequenced Packet Exchange
@cindex SPX
@section Sequenced Packet Exchange
@itemize @bullet
@item Module: @command{spx.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Not all applications are supported.
@end itemize
@cindex Secure Shell
@cindex SSH
@section Secure Shell
@itemize @bullet
@item Module: @command{ssh.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Only the initial version number exchange is supported.
@end itemize
@cindex Transmission Control Protocol
@cindex TCP
@section Transmission Control Protocol
@itemize @bullet
@item Module: @command{tcp.c}
@item Support: Partial.
@item Maturity: Well tested.
@item Notes: Not all options are well supported. Program might crash on
assorted nastygrams. In the minimal mode output, there are four parameters
following the port numbers. They are, in order: a list of all flags
that are set, the sequence number, the acknowledgement number, and the
advertized window size.
@end itemize
@cindex Trivial File Transfer Protocol
@cindex TFTP
@section Trivial File Transfer Protocol (TFTP)
@itemize @bullet
@item Module: @command{tftp.c}
@item Support: Full.
@item Maturity: Well tested.
@item Notes: Displays all associated parameters. Figures out port number
of transfer on the fly.
@end itemize
@cindex User Datagram Protocol
@cindex UDP
@section User Datagram Protocol
@itemize @bullet
@item Module: @command{udp.c}
@item Support: Full.
@item Maturity: Fully tested.
@item Notes:
@end itemize
@c CHAPTER
@node History, Index, Status, Top
@chapter History
@cindex History
Like many other folks, I started using @command{tcpdump} after reading
Rich Stevens' wonderful book, @emph{TCP/IP Illustrated Vol. 1}. Each
packet is summarized in a single compact, but slightly cryptic, line of
output. While @command{tcpdump} remained a classic, around 1997
development had slowed quite a bit. Support for new protocols was not
being added to the official distribution, and understanding and
modifying the existing code could be trying. I felt the need to provide
a more general packet sniffer that not only displayed @emph{all} of a
packet's fields, but was written in a way that could easily be read,
understood, and modified.
In Fall 1997 I developed the first few versions of IPgrab. They were
very tentative, just displaying Ethernet, IP, TCP, and UDP fields. For
the most part, they only compiled on Linux. But I had gotten a taste of
how useful such a tool could be. I used IPgrab to find out that Windows
NT 4.0 incremented IP identification fields by 256 instead of 1, and to
find out that a LAN router wasn't proxy ARPing correctly.
Over the next two years I added features to IPgrab. Most of the work
was done in my spare time, and progress was slow. Occasionally I
received a very useful patch from a user. I also worked on porting it
to other systems besides Linux -- in particular, FreeBSD and Solaris.
By mid-1999, IPgrab was stable (version 0.8.2) and supported a number of
rather complex protocol suites, such as IPsec, L2TP and some VoIP
protocols. I didn't do much work until April 2000, when I decided to
host it on Sourceforge.net.
It was time for a massive overhaul. Development took three major
angles: (1) New APIs for safe reading from a packet and displaying to an
output device, (2) a line-based minimal output mode comparable to
@command{tcpdump}, and (3) more protocol support. In particular, the
APIs took a while to get right, but now they're in place and work really
well. This required a re-write of every module, resulted in an overall
cleanup of the code. Release 0.9 was the first official release with
these new features. The releases since 0.9 have added support for more
protocols, cleaned up the architecture, and fixed bugs.
@command{tcpdump} development is once again underway and there are many
freeware and open source packet sniffers available that do much of what
IPgrab does. However, I've continued to develop IPgrab for a number of
reasons. In particular, new protocols are being designed so quickly by
the IETF and other organizations that it becomes very useful to be able
to add these protocols quickly to a sniffer. Some of the extensions to
IETF protocols that are defined by other Standards Development
Organizations are typically not supported in sniffers. Also, developing
IPgrab gives me a reason to stay on top of protocol developments and
keep my hands dirty with coding.
@node Index, , History, Top
@chapter Index
@printindex cp
@bye
|