• Home
Name Date Size #Lines LOC

..--

lbl/03-May-2024-302205

missing/03-May-2024-1,7531,151

tests/03-May-2024-31,25630,537

win32/03-May-2024-5,1704,860

.gitattributesD03-May-2024573 2723

.gitignoreD03-May-2024179 1918

Android.mkD03-May-20244.5 KiB195182

CHANGESD03-May-202452.3 KiB1,3211,072

CONTRIBUTINGD03-May-20243.8 KiB10476

CREDITSD03-May-202414.3 KiB235229

CleanSpec.mkD03-May-20242.2 KiB500

INSTALL.txtD03-May-20245.2 KiB123114

LICENSED03-May-2024873 2016

MODULE_LICENSE_BSDD03-May-20240

Makefile-devel-addsD03-May-2024614 2318

Makefile.inD03-May-20249.9 KiB463385

NOTICED03-May-2024873 2016

PLATFORMSD03-May-2024172 106

READMED03-May-20249.5 KiB244192

README.mdD03-May-20249.5 KiB244192

README.versionD03-May-202493 43

Readme.Win32D03-May-20241 KiB2419

VERSIOND03-May-20246 21

aclocal.m4D03-May-202440.4 KiB1,3621,292

addrtoname.cD03-May-202432.6 KiB1,2741,024

addrtoname.hD03-May-20242.8 KiB6229

addrtostr.cD03-May-20245.7 KiB215133

addrtostr.hD03-May-20242 KiB432

af.cD03-May-20242 KiB5938

af.hD03-May-20241.8 KiB5627

ah.hD03-May-20242.3 KiB5816

appletalk.hD03-May-20244.1 KiB167103

ascii_strcasecmp.cD03-May-20243.5 KiB10666

ascii_strcasecmp.hD03-May-20241.5 KiB346

atime.awkD03-May-2024529 199

atm.hD03-May-20241.1 KiB326

bpf_dump.cD03-May-20241.9 KiB6235

chdlc.hD03-May-20241.3 KiB275

checksum.cD03-May-20245.3 KiB190118

config.guessD03-May-202442.3 KiB1,4361,243

config.hD03-May-202412 KiB39670

config.h.inD03-May-202411.4 KiB395269

config.subD03-May-202435.2 KiB1,8081,670

configureD03-May-2024257.3 KiB9,6517,584

configure.inD03-May-202425.2 KiB1,004931

cpack.cD03-May-20243.9 KiB15681

cpack.hD03-May-20242.4 KiB5720

ether.hD03-May-20242.3 KiB588

ethertype.hD03-May-20245.6 KiB204163

extract.hD03-May-20249.8 KiB245126

getopt_long.hD03-May-20242.4 KiB6718

gmpls.cD03-May-20245.8 KiB193145

gmpls.hD03-May-20241.4 KiB3417

gmt2local.cD03-May-20242 KiB6728

gmt2local.hD03-May-20241.2 KiB264

in_cksum.cD03-May-20246.4 KiB20190

install-shD03-May-20245.4 KiB251152

interface.hD03-May-20242.3 KiB8042

ip.hD03-May-20245.7 KiB16583

ip6.hD03-May-20247.6 KiB20395

ipproto.cD03-May-20241.7 KiB5737

ipproto.hD03-May-20244.6 KiB14697

l2vpn.cD03-May-20243.4 KiB9663

l2vpn.hD03-May-2024782 182

llc.hD03-May-20243.7 KiB12384

machdep.cD03-May-20242.6 KiB7531

machdep.hD03-May-20241.2 KiB264

makemibD03-May-20246.4 KiB248186

mib.hD03-May-202426.3 KiB1,4611,450

mkdepD03-May-20242.4 KiB11366

mpls.hD03-May-20241.9 KiB4212

nameser.hD03-May-202410.8 KiB301172

netdissect-stdinc.hD03-May-20249.8 KiB405222

netdissect.cD03-May-20243.4 KiB14777

netdissect.hD03-May-202430.2 KiB664439

nfs.hD03-May-202413.4 KiB439312

nfsfh.hD03-May-20242.6 KiB6713

nlpid.cD03-May-20241.3 KiB4224

nlpid.hD03-May-20241.3 KiB3316

openflow.hD03-May-20242.1 KiB5215

ospf.hD03-May-202410.2 KiB326221

oui.cD03-May-20243.8 KiB10574

oui.hD03-May-20244.1 KiB9264

packetdat.awkD03-May-20241.4 KiB6247

parsenfsfh.cD03-May-202412.9 KiB483296

pcap-missing.hD03-May-20241.8 KiB5016

pcap_dump_ftell.cD03-May-20241.3 KiB328

ppp.hD03-May-20243.1 KiB6945

print-802_11.cD03-May-202491.5 KiB3,3792,382

print-802_15_4.cD03-May-20243.8 KiB182134

print-ah.cD03-May-20242 KiB6530

print-ahcp.cD03-May-202410.7 KiB412327

print-aodv.cD03-May-202415.8 KiB533432

print-aoe.cD03-May-202411.1 KiB431322

print-ap1394.cD03-May-20244 KiB12670

print-arcnet.cD03-May-20248.8 KiB361217

print-arp.cD03-May-202413.3 KiB426305

print-ascii.cD03-May-20246.2 KiB210142

print-atalk.cD03-May-202416.8 KiB662512

print-atm.cD03-May-202416.8 KiB556361

print-babel.cD03-May-202423.7 KiB718594

print-beep.cD03-May-20241.5 KiB6133

print-bfd.cD03-May-202416.2 KiB407249

print-bgp.cD03-May-202497.7 KiB2,8372,318

print-bootp.cD03-May-202430 KiB1,094863

print-bt.cD03-May-20242.2 KiB7229

print-calm-fast.cD03-May-20241.8 KiB7631

print-carp.cD03-May-20242.4 KiB8440

print-cdp.cD03-May-202411.2 KiB405309

print-cfm.cD03-May-202421.8 KiB718530

print-chdlc.cD03-May-20245.8 KiB207141

print-cip.cD03-May-20242.5 KiB10950

print-cnfp.cD03-May-202413.7 KiB478343

print-dccp.cD03-May-202416.4 KiB660535

print-decnet.cD03-May-202438.3 KiB1,2721,104

print-dhcp6.cD03-May-202423.2 KiB829708

print-domain.cD03-May-202418.2 KiB749638

print-dtp.cD03-May-20243 KiB12976

print-dvmrp.cD03-May-20248.9 KiB368293

print-eap.cD03-May-20248.9 KiB295214

print-egp.cD03-May-20248.7 KiB377319

print-eigrp.cD03-May-202417.1 KiB476375

print-enc.cD03-May-20244.2 KiB13956

print-esp.cD03-May-202417.5 KiB754503

print-ether.cD03-May-202412.9 KiB464312

print-fddi.cD03-May-202410.5 KiB346203

print-forces.cD03-May-202445 KiB1,7611,407

print-fr.cD03-May-202431.7 KiB1,143721

print-frag6.cD03-May-20242.4 KiB7038

print-ftp.cD03-May-2024973 3313

print-geneve.cD03-May-20246.1 KiB238156

print-geonet.cD03-May-20246.7 KiB287204

print-gre.cD03-May-20249.7 KiB423322

print-hncp.cD03-May-202426 KiB856707

print-hsrp.cD03-May-20244.6 KiB13673

print-http.cD03-May-20241.5 KiB7854

print-icmp.cD03-May-202422.4 KiB699523

print-icmp6.cD03-May-202459.5 KiB1,9541,624

print-igmp.cD03-May-202410.1 KiB342275

print-igrp.cD03-May-20244.6 KiB156107

print-ip.cD03-May-202416.7 KiB721519

print-ip6.cD03-May-202410.4 KiB413271

print-ip6opts.cD03-May-20245.5 KiB214163

print-ipcomp.cD03-May-20242.3 KiB7025

print-ipfc.cD03-May-20244.4 KiB14665

print-ipnet.cD03-May-20242.5 KiB11880

print-ipx.cD03-May-20246.4 KiB239179

print-isakmp.cD03-May-202480.6 KiB3,0972,446

print-isoclns.cD03-May-2024104.6 KiB3,1472,565

print-juniper.cD03-May-202447.6 KiB1,4701,218

print-krb.cD03-May-20246.3 KiB259195

print-l2tp.cD03-May-202422.6 KiB750625

print-lane.cD03-May-20243 KiB12569

print-ldp.cD03-May-202423.9 KiB699504

print-lisp.cD03-May-202415.2 KiB450281

print-llc.cD03-May-202416.7 KiB615389

print-lldp.cD03-May-202457.2 KiB1,6581,356

print-lmp.cD03-May-202429.1 KiB872682

print-loopback.cD03-May-20243.6 KiB13783

print-lspping.cD03-May-202451.6 KiB1,085688

print-lwapp.cD03-May-202413 KiB350234

print-lwres.cD03-May-202414.1 KiB596412

print-m3ua.cD03-May-202410.9 KiB340239

print-medsa.cD03-May-20245.6 KiB197130

print-mobile.cD03-May-20243.3 KiB10450

print-mobility.cD03-May-20249.5 KiB337254

print-mpcp.cD03-May-20247.9 KiB260196

print-mpls.cD03-May-20245.3 KiB223127

print-mptcp.cD03-May-202413 KiB431323

print-msdp.cD03-May-20242.7 KiB10470

print-msnlb.cD03-May-20242.4 KiB6628

print-nflog.cD03-May-20244.4 KiB169103

print-nfs.cD03-May-202442.7 KiB1,7111,403

print-nsh.cD03-May-20245.4 KiB186126

print-ntp.cD03-May-202413.3 KiB428262

print-null.cD03-May-20244 KiB14866

print-olsr.cD03-May-202423.3 KiB717493

print-openflow-1.0.cD03-May-202476.6 KiB2,5611,998

print-openflow.cD03-May-20244.8 KiB14382

print-ospf.cD03-May-202439.5 KiB1,210997

print-ospf6.cD03-May-202429.7 KiB1,011798

print-otv.cD03-May-20242.1 KiB7330

print-pflog.cD03-May-20244.8 KiB186129

print-pgm.cD03-May-202419.9 KiB785653

print-pim.cD03-May-202431.6 KiB1,158882

print-pktap.cD03-May-20245.1 KiB17093

print-ppi.cD03-May-20242.6 KiB13087

print-ppp.cD03-May-202446 KiB1,8681,483

print-pppoe.cD03-May-20245.7 KiB202142

print-pptp.cD03-May-202425.9 KiB1,007810

print-radius.cD03-May-202435.2 KiB998774

print-raw.cD03-May-20241.5 KiB4613

print-resp.cD03-May-202416.4 KiB539305

print-rip.cD03-May-20249.2 KiB274188

print-ripng.cD03-May-20245.7 KiB175110

print-rpki-rtr.cD03-May-20248.8 KiB372234

print-rrcp.cD03-May-20244.6 KiB13088

print-rsvp.cD03-May-202477.3 KiB1,9731,663

print-rt6.cD03-May-20242.6 KiB9454

print-rtsp.cD03-May-20241.2 KiB4827

print-rx.cD03-May-202466.5 KiB2,8882,138

print-sctp.cD03-May-202423.1 KiB818571

print-sflow.cD03-May-202431.5 KiB992781

print-sip.cD03-May-20241.3 KiB5531

print-sl.cD03-May-20246.3 KiB256174

print-sll.cD03-May-20248.9 KiB311137

print-slow.cD03-May-202425.2 KiB745575

print-smb.cD03-May-202442.9 KiB1,4991,232

print-smtp.cD03-May-2024983 3313

print-snmp.cD03-May-202443.2 KiB1,9401,458

print-stp.cD03-May-202417.1 KiB509342

print-sunatm.cD03-May-20243.3 KiB10950

print-sunrpc.cD03-May-20247.8 KiB251123

print-symantec.cD03-May-20243.8 KiB11566

print-syslog.cD03-May-20244 KiB147101

print-tcp.cD03-May-202435.5 KiB921709

print-telnet.cD03-May-202415 KiB557412

print-tftp.cD03-May-20245.8 KiB223152

print-timed.cD03-May-20244.7 KiB151101

print-tipc.cD03-May-202411.5 KiB386314

print-token.cD03-May-20248 KiB251146

print-udld.cD03-May-20245.5 KiB199109

print-udp.cD03-May-202421.3 KiB719606

print-usb.cD03-May-20244.2 KiB177116

print-vjc.cD03-May-20244.4 KiB12142

print-vqp.cD03-May-20246.4 KiB200134

print-vrrp.cD03-May-20246.3 KiB18495

print-vtp.cD03-May-202412.6 KiB384214

print-vxlan-gpe.cD03-May-20243.5 KiB11458

print-vxlan.cD03-May-20242.2 KiB7528

print-wb.cD03-May-202410.7 KiB454333

print-zephyr.cD03-May-20247.8 KiB321249

print-zeromq.cD03-May-20247.5 KiB221112

print.cD03-May-202411.8 KiB485352

print.hD03-May-20241.8 KiB4511

rpc_auth.hD03-May-20242.7 KiB7920

rpc_msg.hD03-May-20243.2 KiB12856

rpl.hD03-May-20244.9 KiB175126

send-ack.awkD03-May-20241.6 KiB6957

setsignal.cD03-May-20243.3 KiB9132

setsignal.hD03-May-20241.2 KiB264

signature.cD03-May-20245.6 KiB215105

signature.hD03-May-20241.1 KiB308

slcompress.hD03-May-20243.6 KiB8614

smb.hD03-May-20245.4 KiB12395

smbutil.cD03-May-202462.9 KiB1,8931,724

stime.awkD03-May-2024567 2010

strtoaddr.cD03-May-20245.3 KiB240148

strtoaddr.hD03-May-2024992 242

tcp.hD03-May-20245 KiB161114

tcpdump.1.inD03-May-202460.4 KiB1,9761,946

tcpdump.cD03-May-202468.1 KiB2,6411,842

timeval-operations.hD03-May-20243.2 KiB7941

udp.hD03-May-20248.3 KiB317276

util-print.cD03-May-202422.5 KiB939591

version.cD03-May-202432 21

vfprintf.cD03-May-20241.6 KiB5524

README

1# tcpdump
2
3[![Build
4Status](https://travis-ci.org/the-tcpdump-group/tcpdump.png)](https://travis-ci.org/the-tcpdump-group/tcpdump)
5
6TCPDUMP 4.x.y
7Now maintained by "The Tcpdump Group"
8See 		www.tcpdump.org
9
10Please send inquiries/comments/reports to:
11
12* tcpdump-workers@lists.tcpdump.org
13
14Anonymous Git is available via:
15
16	git clone git://bpf.tcpdump.org/tcpdump
17
18Please submit patches by forking the branch on GitHub at:
19
20*	http://github.com/the-tcpdump-group/tcpdump/tree/master
21
22and issuing a pull request.
23
24formerly from 	Lawrence Berkeley National Laboratory
25		Network Research Group <tcpdump@ee.lbl.gov>
26		ftp://ftp.ee.lbl.gov/old/tcpdump.tar.Z (3.4)
27
28This directory contains source code for tcpdump, a tool for network
29monitoring and data acquisition.  This software was originally
30developed by the Network Research Group at the Lawrence Berkeley
31National Laboratory.  The original distribution is available via
32anonymous ftp to `ftp.ee.lbl.gov`, in `tcpdump.tar.Z`.  More recent
33development is performed at tcpdump.org, http://www.tcpdump.org/
34
35Tcpdump uses libpcap, a system-independent interface for user-level
36packet capture.  Before building tcpdump, you must first retrieve and
37build libpcap, also originally from LBL and now being maintained by
38tcpdump.org; see http://www.tcpdump.org/ .
39
40Once libpcap is built (either install it or make sure it's in
41`../libpcap`), you can build tcpdump using the procedure in the `INSTALL.txt`
42file.
43
44The program is loosely based on SMI's "etherfind" although none of the
45etherfind code remains.  It was originally written by Van Jacobson as
46part of an ongoing research project to investigate and improve tcp and
47internet gateway performance.  The parts of the program originally
48taken from Sun's etherfind were later re-written by Steven McCanne of
49LBL.  To insure that there would be no vestige of proprietary code in
50tcpdump, Steve wrote these pieces from the specification given by the
51manual entry, with no access to the source of tcpdump or etherfind.
52
53Over the past few years, tcpdump has been steadily improved by the
54excellent contributions from the Internet community (just browse
55through the `CHANGES` file).  We are grateful for all the input.
56
57Richard Stevens gives an excellent treatment of the Internet protocols
58in his book *"TCP/IP Illustrated, Volume 1"*. If you want to learn more
59about tcpdump and how to interpret its output, pick up this book.
60
61Some tools for viewing and analyzing tcpdump trace files are available
62from the Internet Traffic Archive:
63
64* http://www.sigcomm.org/ITA/
65
66Another tool that tcpdump users might find useful is tcpslice:
67
68* https://github.com/the-tcpdump-group/tcpslice
69
70It is a program that can be used to extract portions of tcpdump binary
71trace files. See the above distribution for further details and
72documentation.
73
74Problems, bugs, questions, desirable enhancements, etc. should be sent
75to the address "tcpdump-workers@lists.tcpdump.org".  Bugs, support
76requests, and feature requests may also be submitted on the GitHub issue
77tracker for tcpdump at:
78
79* https://github.com/the-tcpdump-group/tcpdump/issues
80
81Source code contributions, etc. should be sent to the email address
82above or submitted by forking the branch on GitHub at:
83
84* http://github.com/the-tcpdump-group/tcpdump/tree/master
85
86and issuing a pull request.
87
88Current versions can be found at www.tcpdump.org.
89
90 - The TCPdump team
91
92original text by: Steve McCanne, Craig Leres, Van Jacobson
93
94-------------------------------------
95```
96This directory also contains some short awk programs intended as
97examples of ways to reduce tcpdump data when you're tracking
98particular network problems:
99
100send-ack.awk
101	Simplifies the tcpdump trace for an ftp (or other unidirectional
102	tcp transfer).  Since we assume that one host only sends and
103	the other only acks, all address information is left off and
104	we just note if the packet is a "send" or an "ack".
105
106	There is one output line per line of the original trace.
107	Field 1 is the packet time in decimal seconds, relative
108	to the start of the conversation.  Field 2 is delta-time
109	from last packet.  Field 3 is packet type/direction.
110	"Send" means data going from sender to receiver, "ack"
111	means an ack going from the receiver to the sender.  A
112	preceding "*" indicates that the data is a retransmission.
113	A preceding "-" indicates a hole in the sequence space
114	(i.e., missing packet(s)), a "#" means an odd-size (not max
115	seg size) packet.  Field 4 has the packet flags
116	(same format as raw trace).  Field 5 is the sequence
117	number (start seq. num for sender, next expected seq number
118	for acks).  The number in parens following an ack is
119	the delta-time from the first send of the packet to the
120	ack.  A number in parens following a send is the
121	delta-time from the first send of the packet to the
122	current send (on duplicate packets only).  Duplicate
123	sends or acks have a number in square brackets showing
124	the number of duplicates so far.
125
126	Here is a short sample from near the start of an ftp:
127		3.00    0.20   send . 512
128		3.20    0.20    ack . 1024  (0.20)
129		3.20    0.00   send P 1024
130		3.40    0.20    ack . 1536  (0.20)
131		3.80    0.40 * send . 0  (3.80) [2]
132		3.82    0.02 *  ack . 1536  (0.62) [2]
133	Three seconds into the conversation, bytes 512 through 1023
134	were sent.  200ms later they were acked.  Shortly thereafter
135	bytes 1024-1535 were sent and again acked after 200ms.
136	Then, for no apparent reason, 0-511 is retransmitted, 3.8
137	seconds after its initial send (the round trip time for this
138	ftp was 1sec, +-500ms).  Since the receiver is expecting
139	1536, 1536 is re-acked when 0 arrives.
140
141packetdat.awk
142	Computes chunk summary data for an ftp (or similar
143	unidirectional tcp transfer). [A "chunk" refers to
144	a chunk of the sequence space -- essentially the packet
145	sequence number divided by the max segment size.]
146
147	A summary line is printed showing the number of chunks,
148	the number of packets it took to send that many chunks
149	(if there are no lost or duplicated packets, the number
150	of packets should equal the number of chunks) and the
151	number of acks.
152
153	Following the summary line is one line of information
154	per chunk.  The line contains eight fields:
155	   1 - the chunk number
156	   2 - the start sequence number for this chunk
157	   3 - time of first send
158	   4 - time of last send
159	   5 - time of first ack
160	   6 - time of last ack
161	   7 - number of times chunk was sent
162	   8 - number of times chunk was acked
163	(all times are in decimal seconds, relative to the start
164	of the conversation.)
165
166	As an example, here is the first part of the output for
167	an ftp trace:
168
169	# 134 chunks.  536 packets sent.  508 acks.
170	1       1       0.00    5.80    0.20    0.20    4       1
171	2       513     0.28    6.20    0.40    0.40    4       1
172	3       1025    1.16    6.32    1.20    1.20    4       1
173	4       1561    1.86    15.00   2.00    2.00    6       1
174	5       2049    2.16    15.44   2.20    2.20    5       1
175	6       2585    2.64    16.44   2.80    2.80    5       1
176	7       3073    3.00    16.66   3.20    3.20    4       1
177	8       3609    3.20    17.24   3.40    5.82    4       11
178	9       4097    6.02    6.58    6.20    6.80    2       5
179
180	This says that 134 chunks were transferred (about 70K
181	since the average packet size was 512 bytes).  It took
182	536 packets to transfer the data (i.e., on the average
183	each chunk was transmitted four times).  Looking at,
184	say, chunk 4, we see it represents the 512 bytes of
185	sequence space from 1561 to 2048.  It was first sent
186	1.86 seconds into the conversation.  It was last
187	sent 15 seconds into the conversation and was sent
188	a total of 6 times (i.e., it was retransmitted every
189	2 seconds on the average).  It was acked once, 140ms
190	after it first arrived.
191
192stime.awk
193atime.awk
194	Output one line per send or ack, respectively, in the form
195		<time> <seq. number>
196	where <time> is the time in seconds since the start of the
197	transfer and <seq. number> is the sequence number being sent
198	or acked.  I typically plot this data looking for suspicious
199	patterns.
200
201
202The problem I was looking at was the bulk-data-transfer
203throughput of medium delay network paths (1-6 sec.  round trip
204time) under typical DARPA Internet conditions.  The trace of the
205ftp transfer of a large file was used as the raw data source.
206The method was:
207
208  - On a local host (but not the Sun running tcpdump), connect to
209    the remote ftp.
210
211  - On the monitor Sun, start the trace going.  E.g.,
212      tcpdump host local-host and remote-host and port ftp-data >tracefile
213
214  - On local, do either a get or put of a large file (~500KB),
215    preferably to the null device (to minimize effects like
216    closing the receive window while waiting for a disk write).
217
218  - When transfer is finished, stop tcpdump.  Use awk to make up
219    two files of summary data (maxsize is the maximum packet size,
220    tracedata is the file of tcpdump tracedata):
221      awk -f send-ack.awk packetsize=avgsize tracedata >sa
222      awk -f packetdat.awk packetsize=avgsize tracedata >pd
223
224  - While the summary data files are printing, take a look at
225    how the transfer behaved:
226      awk -f stime.awk tracedata | xgraph
227    (90% of what you learn seems to happen in this step).
228
229  - Do all of the above steps several times, both directions,
230    at different times of day, with different protocol
231    implementations on the other end.
232
233  - Using one of the Unix data analysis packages (in my case,
234    S and Gary Perlman's Unix|Stat), spend a few months staring
235    at the data.
236
237  - Change something in the local protocol implementation and
238    redo the steps above.
239
240  - Once a week, tell your funding agent that you're discovering
241    wonderful things and you'll write up that research report
242    "real soon now".
243```
244

README.md

1# tcpdump
2
3[![Build
4Status](https://travis-ci.org/the-tcpdump-group/tcpdump.png)](https://travis-ci.org/the-tcpdump-group/tcpdump)
5
6TCPDUMP 4.x.y
7Now maintained by "The Tcpdump Group"
8See 		www.tcpdump.org
9
10Please send inquiries/comments/reports to:
11
12* tcpdump-workers@lists.tcpdump.org
13
14Anonymous Git is available via:
15
16	git clone git://bpf.tcpdump.org/tcpdump
17
18Please submit patches by forking the branch on GitHub at:
19
20*	http://github.com/the-tcpdump-group/tcpdump/tree/master
21
22and issuing a pull request.
23
24formerly from 	Lawrence Berkeley National Laboratory
25		Network Research Group <tcpdump@ee.lbl.gov>
26		ftp://ftp.ee.lbl.gov/old/tcpdump.tar.Z (3.4)
27
28This directory contains source code for tcpdump, a tool for network
29monitoring and data acquisition.  This software was originally
30developed by the Network Research Group at the Lawrence Berkeley
31National Laboratory.  The original distribution is available via
32anonymous ftp to `ftp.ee.lbl.gov`, in `tcpdump.tar.Z`.  More recent
33development is performed at tcpdump.org, http://www.tcpdump.org/
34
35Tcpdump uses libpcap, a system-independent interface for user-level
36packet capture.  Before building tcpdump, you must first retrieve and
37build libpcap, also originally from LBL and now being maintained by
38tcpdump.org; see http://www.tcpdump.org/ .
39
40Once libpcap is built (either install it or make sure it's in
41`../libpcap`), you can build tcpdump using the procedure in the `INSTALL.txt`
42file.
43
44The program is loosely based on SMI's "etherfind" although none of the
45etherfind code remains.  It was originally written by Van Jacobson as
46part of an ongoing research project to investigate and improve tcp and
47internet gateway performance.  The parts of the program originally
48taken from Sun's etherfind were later re-written by Steven McCanne of
49LBL.  To insure that there would be no vestige of proprietary code in
50tcpdump, Steve wrote these pieces from the specification given by the
51manual entry, with no access to the source of tcpdump or etherfind.
52
53Over the past few years, tcpdump has been steadily improved by the
54excellent contributions from the Internet community (just browse
55through the `CHANGES` file).  We are grateful for all the input.
56
57Richard Stevens gives an excellent treatment of the Internet protocols
58in his book *"TCP/IP Illustrated, Volume 1"*. If you want to learn more
59about tcpdump and how to interpret its output, pick up this book.
60
61Some tools for viewing and analyzing tcpdump trace files are available
62from the Internet Traffic Archive:
63
64* http://www.sigcomm.org/ITA/
65
66Another tool that tcpdump users might find useful is tcpslice:
67
68* https://github.com/the-tcpdump-group/tcpslice
69
70It is a program that can be used to extract portions of tcpdump binary
71trace files. See the above distribution for further details and
72documentation.
73
74Problems, bugs, questions, desirable enhancements, etc. should be sent
75to the address "tcpdump-workers@lists.tcpdump.org".  Bugs, support
76requests, and feature requests may also be submitted on the GitHub issue
77tracker for tcpdump at:
78
79* https://github.com/the-tcpdump-group/tcpdump/issues
80
81Source code contributions, etc. should be sent to the email address
82above or submitted by forking the branch on GitHub at:
83
84* http://github.com/the-tcpdump-group/tcpdump/tree/master
85
86and issuing a pull request.
87
88Current versions can be found at www.tcpdump.org.
89
90 - The TCPdump team
91
92original text by: Steve McCanne, Craig Leres, Van Jacobson
93
94-------------------------------------
95```
96This directory also contains some short awk programs intended as
97examples of ways to reduce tcpdump data when you're tracking
98particular network problems:
99
100send-ack.awk
101	Simplifies the tcpdump trace for an ftp (or other unidirectional
102	tcp transfer).  Since we assume that one host only sends and
103	the other only acks, all address information is left off and
104	we just note if the packet is a "send" or an "ack".
105
106	There is one output line per line of the original trace.
107	Field 1 is the packet time in decimal seconds, relative
108	to the start of the conversation.  Field 2 is delta-time
109	from last packet.  Field 3 is packet type/direction.
110	"Send" means data going from sender to receiver, "ack"
111	means an ack going from the receiver to the sender.  A
112	preceding "*" indicates that the data is a retransmission.
113	A preceding "-" indicates a hole in the sequence space
114	(i.e., missing packet(s)), a "#" means an odd-size (not max
115	seg size) packet.  Field 4 has the packet flags
116	(same format as raw trace).  Field 5 is the sequence
117	number (start seq. num for sender, next expected seq number
118	for acks).  The number in parens following an ack is
119	the delta-time from the first send of the packet to the
120	ack.  A number in parens following a send is the
121	delta-time from the first send of the packet to the
122	current send (on duplicate packets only).  Duplicate
123	sends or acks have a number in square brackets showing
124	the number of duplicates so far.
125
126	Here is a short sample from near the start of an ftp:
127		3.00    0.20   send . 512
128		3.20    0.20    ack . 1024  (0.20)
129		3.20    0.00   send P 1024
130		3.40    0.20    ack . 1536  (0.20)
131		3.80    0.40 * send . 0  (3.80) [2]
132		3.82    0.02 *  ack . 1536  (0.62) [2]
133	Three seconds into the conversation, bytes 512 through 1023
134	were sent.  200ms later they were acked.  Shortly thereafter
135	bytes 1024-1535 were sent and again acked after 200ms.
136	Then, for no apparent reason, 0-511 is retransmitted, 3.8
137	seconds after its initial send (the round trip time for this
138	ftp was 1sec, +-500ms).  Since the receiver is expecting
139	1536, 1536 is re-acked when 0 arrives.
140
141packetdat.awk
142	Computes chunk summary data for an ftp (or similar
143	unidirectional tcp transfer). [A "chunk" refers to
144	a chunk of the sequence space -- essentially the packet
145	sequence number divided by the max segment size.]
146
147	A summary line is printed showing the number of chunks,
148	the number of packets it took to send that many chunks
149	(if there are no lost or duplicated packets, the number
150	of packets should equal the number of chunks) and the
151	number of acks.
152
153	Following the summary line is one line of information
154	per chunk.  The line contains eight fields:
155	   1 - the chunk number
156	   2 - the start sequence number for this chunk
157	   3 - time of first send
158	   4 - time of last send
159	   5 - time of first ack
160	   6 - time of last ack
161	   7 - number of times chunk was sent
162	   8 - number of times chunk was acked
163	(all times are in decimal seconds, relative to the start
164	of the conversation.)
165
166	As an example, here is the first part of the output for
167	an ftp trace:
168
169	# 134 chunks.  536 packets sent.  508 acks.
170	1       1       0.00    5.80    0.20    0.20    4       1
171	2       513     0.28    6.20    0.40    0.40    4       1
172	3       1025    1.16    6.32    1.20    1.20    4       1
173	4       1561    1.86    15.00   2.00    2.00    6       1
174	5       2049    2.16    15.44   2.20    2.20    5       1
175	6       2585    2.64    16.44   2.80    2.80    5       1
176	7       3073    3.00    16.66   3.20    3.20    4       1
177	8       3609    3.20    17.24   3.40    5.82    4       11
178	9       4097    6.02    6.58    6.20    6.80    2       5
179
180	This says that 134 chunks were transferred (about 70K
181	since the average packet size was 512 bytes).  It took
182	536 packets to transfer the data (i.e., on the average
183	each chunk was transmitted four times).  Looking at,
184	say, chunk 4, we see it represents the 512 bytes of
185	sequence space from 1561 to 2048.  It was first sent
186	1.86 seconds into the conversation.  It was last
187	sent 15 seconds into the conversation and was sent
188	a total of 6 times (i.e., it was retransmitted every
189	2 seconds on the average).  It was acked once, 140ms
190	after it first arrived.
191
192stime.awk
193atime.awk
194	Output one line per send or ack, respectively, in the form
195		<time> <seq. number>
196	where <time> is the time in seconds since the start of the
197	transfer and <seq. number> is the sequence number being sent
198	or acked.  I typically plot this data looking for suspicious
199	patterns.
200
201
202The problem I was looking at was the bulk-data-transfer
203throughput of medium delay network paths (1-6 sec.  round trip
204time) under typical DARPA Internet conditions.  The trace of the
205ftp transfer of a large file was used as the raw data source.
206The method was:
207
208  - On a local host (but not the Sun running tcpdump), connect to
209    the remote ftp.
210
211  - On the monitor Sun, start the trace going.  E.g.,
212      tcpdump host local-host and remote-host and port ftp-data >tracefile
213
214  - On local, do either a get or put of a large file (~500KB),
215    preferably to the null device (to minimize effects like
216    closing the receive window while waiting for a disk write).
217
218  - When transfer is finished, stop tcpdump.  Use awk to make up
219    two files of summary data (maxsize is the maximum packet size,
220    tracedata is the file of tcpdump tracedata):
221      awk -f send-ack.awk packetsize=avgsize tracedata >sa
222      awk -f packetdat.awk packetsize=avgsize tracedata >pd
223
224  - While the summary data files are printing, take a look at
225    how the transfer behaved:
226      awk -f stime.awk tracedata | xgraph
227    (90% of what you learn seems to happen in this step).
228
229  - Do all of the above steps several times, both directions,
230    at different times of day, with different protocol
231    implementations on the other end.
232
233  - Using one of the Unix data analysis packages (in my case,
234    S and Gary Perlman's Unix|Stat), spend a few months staring
235    at the data.
236
237  - Change something in the local protocol implementation and
238    redo the steps above.
239
240  - Once a week, tell your funding agent that you're discovering
241    wonderful things and you'll write up that research report
242    "real soon now".
243```
244

README.version

1URL: http://www.tcpdump.org/release/tcpdump-4.9.0.tar.gz
2Version: 4.9.0
3BugComponent: 119452
4

Readme.Win32

1To build tcpdump under Windows, you need:
2
3- version 6 (or higher) of Microsoft Visual Studio or the Cygnus gnu
4C compiler.
5- The November 2001 (or later) edition of Microsoft Platform
6Software Development Kit (SDK), that contains some necessary includes
7for IPv6 support. You can download it from http://www.microsoft.com/sdk
8- the WinPcap source code, that includes libpcap for win32. Download it
9from http://winpcap.polito.it or download libpcap sources from
10http://www.tcpdump.org and follow the instructions in the README.Win32
11file.
12
13First, extract tcpdump and WinPcap in the same folder, and build WinPcap.
14
15The Visual Studio project and the cygwin makefile are in the Win32\prj
16folder.
17
18From Visual Studio, open windump.dsw and build the program. The release
19version of the WinDump.exe executable file will be created in the
20windump\win32\prj\release directory . The debug version will be generated
21in windump\win32\prj\debug.
22
23From cygnus, go to windump\win32\prj\ and type "make". WinDump.exe will be
24created in the same directory.