Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

dnstraceroute polluted by _any_ incoming ICMP message #62

Closed
ferrieux opened this issue Aug 16, 2019 · 1 comment
Closed

dnstraceroute polluted by _any_ incoming ICMP message #62

ferrieux opened this issue Aug 16, 2019 · 1 comment
Assignees
Labels

Comments

@ferrieux
Copy link

If any ICMP message arrives during a dnstraceroute run, it will be confused with the expected ICMP_TTL_EXCEEDED, regardless of its true type, and its source IP will be displayed at the corresponding hop. This has a pretty high probability of occurrence for example on a DNS resolver, on which dnstraceroute is useful to analyze the recursion side, while the client side has a steady flow of ICMP_PORT_UNREACHABLE due to client-side session timeouts. It also occurs if anybody pings the machine.

To fix this, just as in traceroute, the incoming ICMP packets should be checked against (1) ICMP type (==TTL_EXCEEDED) and (2) L4 header (UDP ports).

@farrokhi farrokhi self-assigned this Aug 17, 2019
@farrokhi farrokhi added the bug label Aug 17, 2019
@ferrieux
Copy link
Author

Thanks, you rock !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants