Date: Wed, 3 Nov 1999 09:22:29 -0800 (PST) From: Julian Elischer <julian@whistle.com> To: sthaug@nethelp.no Cc: freebsd-isp@FreeBSD.ORG, freebsd-hackers@FreeBSD.ORG Subject: Re: Need help to run IP protocol 50 traceroute from Hong Kong Message-ID: <Pine.BSF.4.10.9911030921050.3489-100000@current1.whistle.com> In-Reply-To: <3052.941647380@verdi.nethelp.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 3 Nov 1999 sthaug@nethelp.no wrote: > (Warning: Unrelated to FreeBSD except for the fact that FreeBSD-current > and recent -stable traceroute supports the -P option.) > > I need to find out if IP protocol 50 (used by IPSec) is being blocked on > the way from Hong Kong to a customer of Telia in Norway. Could somebody > in or near Hong Kong, running FreeBSD-current or FreeBSD 3.3, please send > me the output of "traceroute -P 50 flow1.telia.no". I'm particularly > interested if you get a "!P" (protocol unreachable) on the way. > > This is what a normal traceroute looks like from Hongkong Telecom Netplus, > > http://traceroute.hkt.net/cgi-bin/nph-traceroute > > but of course this doesn't tell me anything about IP protocol 50. it would if you used the -P 50 argument TRACEROUTE(8) TRACEROUTE(8) NAME traceroute - print the route packets take to network host SYNOPSIS traceroute [ -Sdnrv ] [ -g gw_host ] [ -M min_ttl ] [ -m max_ttl ] [ -P proto ] [ -p port ] [ -q nqueries ] [ -s src_addr ] [ -t tos ] [ -w waittime ] host [ packetlen ] [...] -P Send packets of specified IP protocol. The cur- rently supported protocols are: UDP, TCP and GRE. Other protocols may also be specified (either by name or by number), though traceroute does not implement any special knowledge of their packet formats. This option is useful for determining which router along a path may be blocking packets based on IP protocol number. But see BUGS below. > > Thanks in advance! > > Steinar Haug, Nethelp consulting, sthaug@nethelp.no > ---------------------------------------------------------------------- > traceroute to flow1.telia.no (194.19.1.190): 1-30 hops, 38 byte packets > 1 e1-3.tmh08.hkt.net (202.84.255.62) 1.24 ms 0.657 ms 0.722 ms > 2 a5-0-1.yck05.hkt.net (205.252.130.82) 1.56 ms 4.21 ms 2.10 ms > 3 f5-0.hk-T3.hkt.net (205.252.130.207) 2.10 ms 1.53 ms 1.95 ms > 4 hssi8-0-0.paix-T3.hkt.net (202.84.128.254) 201 ms 207 ms 198 ms > 5 915.Hssi5-0.GW1.PAO1.ALTER.NET (157.130.193.133) 195 ms (ttl=248!) 184 ms (ttl=248!) 181 ms (ttl=248!) > 6 119.ATM3-0.XR2.PAO1.ALTER.NET (146.188.147.230) 187 ms (ttl=249!) 192 ms (ttl=249!) 184 ms (ttl=249!) > 7 188.ATM7-0.XR2.SFO4.ALTER.NET (146.188.146.230) 185 ms 202 ms 189 ms > 8 190.ATM11-0-0.GW4.SJC2.ALTER.NET (152.63.51.133) 206 ms 194 ms 189 ms > 9 telia-gw.customer.ALTER.NET (157.130.229.118) 268 ms (ttl=246!) * 264 ms (ttl=246!) > 10 sf-b1-atm3-0-103.telia.net (209.95.159.41) 266 ms 272 ms 265 ms > 11 ny-b1-pos5-0-0.telia.net (209.95.159.22) 260 ms (ttl=247!) 261 ms (ttl=247!) 261 ms (ttl=247!) > 12 sto-b1-pos1-0.telia.net (194.17.1.185) 363 ms (ttl=246!) 362 ms (ttl=246!) 361 ms (ttl=246!) > 13 ov-i9-atm3-0-0-1.telia.net (194.17.1.110) 371 ms (ttl=245!) 368 ms (ttl=245!) * > 14 no-oso-i1.telia.net (194.19.1.145) 398 ms (ttl=244!) 417 ms (ttl=244!) 389 ms (ttl=244!) > 15 oslo-accl1.telia.net (194.19.1.116) 383 ms (ttl=243!) 379 ms (ttl=243!) 397 ms (ttl=243!) > 16 flow1.telia.no (194.19.1.190) * 377 ms (ttl=242!) 378 ms (ttl=242!) > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-hackers" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9911030921050.3489-100000>