From owner-freebsd-hackers Wed Nov 3 8:44:41 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from verdi.nethelp.no (verdi.nethelp.no [158.36.41.162]) by hub.freebsd.org (Postfix) with SMTP id CCDF0154C6 for ; Wed, 3 Nov 1999 08:44:36 -0800 (PST) (envelope-from sthaug@nethelp.no) Received: (qmail 3054 invoked by uid 1001); 3 Nov 1999 16:43:00 +0000 (GMT) To: freebsd-isp@freebsd.org, freebsd-hackers@freebsd.org Subject: Need help to run IP protocol 50 traceroute from Hong Kong From: sthaug@nethelp.no X-Mailer: Mew version 1.05+ on Emacs 19.34.2 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Date: Wed, 03 Nov 1999 17:43:00 +0100 Message-ID: <3052.941647380@verdi.nethelp.no> Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG (Warning: Unrelated to FreeBSD except for the fact that FreeBSD-current and recent -stable traceroute supports the -P option.) I need to find out if IP protocol 50 (used by IPSec) is being blocked on the way from Hong Kong to a customer of Telia in Norway. Could somebody in or near Hong Kong, running FreeBSD-current or FreeBSD 3.3, please send me the output of "traceroute -P 50 flow1.telia.no". I'm particularly interested if you get a "!P" (protocol unreachable) on the way. This is what a normal traceroute looks like from Hongkong Telecom Netplus, http://traceroute.hkt.net/cgi-bin/nph-traceroute but of course this doesn't tell me anything about IP protocol 50. Thanks in advance! Steinar Haug, Nethelp consulting, sthaug@nethelp.no ---------------------------------------------------------------------- traceroute to flow1.telia.no (194.19.1.190): 1-30 hops, 38 byte packets 1 e1-3.tmh08.hkt.net (202.84.255.62) 1.24 ms 0.657 ms 0.722 ms 2 a5-0-1.yck05.hkt.net (205.252.130.82) 1.56 ms 4.21 ms 2.10 ms 3 f5-0.hk-T3.hkt.net (205.252.130.207) 2.10 ms 1.53 ms 1.95 ms 4 hssi8-0-0.paix-T3.hkt.net (202.84.128.254) 201 ms 207 ms 198 ms 5 915.Hssi5-0.GW1.PAO1.ALTER.NET (157.130.193.133) 195 ms (ttl=248!) 184 ms (ttl=248!) 181 ms (ttl=248!) 6 119.ATM3-0.XR2.PAO1.ALTER.NET (146.188.147.230) 187 ms (ttl=249!) 192 ms (ttl=249!) 184 ms (ttl=249!) 7 188.ATM7-0.XR2.SFO4.ALTER.NET (146.188.146.230) 185 ms 202 ms 189 ms 8 190.ATM11-0-0.GW4.SJC2.ALTER.NET (152.63.51.133) 206 ms 194 ms 189 ms 9 telia-gw.customer.ALTER.NET (157.130.229.118) 268 ms (ttl=246!) * 264 ms (ttl=246!) 10 sf-b1-atm3-0-103.telia.net (209.95.159.41) 266 ms 272 ms 265 ms 11 ny-b1-pos5-0-0.telia.net (209.95.159.22) 260 ms (ttl=247!) 261 ms (ttl=247!) 261 ms (ttl=247!) 12 sto-b1-pos1-0.telia.net (194.17.1.185) 363 ms (ttl=246!) 362 ms (ttl=246!) 361 ms (ttl=246!) 13 ov-i9-atm3-0-0-1.telia.net (194.17.1.110) 371 ms (ttl=245!) 368 ms (ttl=245!) * 14 no-oso-i1.telia.net (194.19.1.145) 398 ms (ttl=244!) 417 ms (ttl=244!) 389 ms (ttl=244!) 15 oslo-accl1.telia.net (194.19.1.116) 383 ms (ttl=243!) 379 ms (ttl=243!) 397 ms (ttl=243!) 16 flow1.telia.no (194.19.1.190) * 377 ms (ttl=242!) 378 ms (ttl=242!) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message