mirror of
https://github.com/the-tcpdump-group/tcpdump.git
synced 2024-11-24 10:33:28 +08:00
3b46f347ca
of_bitmap_print() used to have its own bitmap printing code, which would yield a single closing parenthesis when none of the assigned tokens matched (that was a bug, althought not triggered by any of the existing tests). Simplify the function to use bittok2str() instead, then observe some changes in OpenFlow 1.0 tests output. Apparently, the old code implemented "match any" for multiple-bit tokens, and bittok2str() now implements "match all". However, in that protocol encoding bitmap tokens are always single-bit, so examine the OFPPS_ props closer and realize that the "state" field of the physical port structure includes both a tiny bitmap and a tiny code point. Leave comments to clarify that, update the props and the printing code. Update output for four tests.
344 lines
26 KiB
Plaintext
344 lines
26 KiB
Plaintext
1 16:11:51.293880 IP (tos 0x0, ttl 55, id 5483, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.37044 > 109.74.202.168.6653: Flags [S], cksum 0x0576 (correct), seq 1216143989, win 14600, options [mss 1460,sackOK,TS val 50525982 ecr 0,nop,wscale 7], length 0
|
|
2 16:11:51.293947 IP (tos 0x0, ttl 64, id 26571, offset 0, flags [DF], proto TCP (6), length 40)
|
|
109.74.202.168.6653 > 88.150.169.52.37044: Flags [R.], cksum 0xa06e (correct), seq 0, ack 1216143990, win 0, length 0
|
|
3 16:11:53.295371 IP (tos 0x0, ttl 55, id 49495, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [S], cksum 0x4629 (correct), seq 774256709, win 14600, options [mss 1460,sackOK,TS val 50526482 ecr 0,nop,wscale 7], length 0
|
|
4 16:11:53.295463 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [S.], cksum 0x39ec (incorrect -> 0x0c04), seq 3422281440, ack 774256710, win 28960, options [mss 1460,sackOK,TS val 590230513 ecr 50526482,nop,wscale 7], length 0
|
|
5 16:11:53.298824 IP (tos 0x0, ttl 55, id 49496, offset 0, flags [DF], proto TCP (6), length 52)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab7c (correct), seq 1, ack 1, win 115, options [nop,nop,TS val 50526483 ecr 590230513], length 0
|
|
6 16:11:53.305813 IP (tos 0x0, ttl 64, id 60691, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa9f0), seq 1:9, ack 1, win 227, options [nop,nop,TS val 590230516 ecr 50526483], length 8: OpenFlow
|
|
version 1.0, type HELLO, length 8, xid 0x00000001
|
|
7 16:11:53.308458 IP (tos 0x0, ttl 55, id 49497, offset 0, flags [DF], proto TCP (6), length 52)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xab6e (correct), seq 1, ack 9, win 115, options [nop,nop,TS val 50526486 ecr 590230516], length 0
|
|
8 16:11:54.295523 IP (tos 0x0, ttl 55, id 49498, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x7b45 (correct), seq 1:9, ack 9, win 115, options [nop,nop,TS val 50526732 ecr 590230516], length 8: OpenFlow
|
|
version 1.0, type HELLO, length 8, xid 0x00002e1b
|
|
9 16:11:54.295579 IP (tos 0x0, ttl 64, id 60692, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa8d7), seq 9, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 0
|
|
10 16:11:54.295793 IP (tos 0x0, ttl 64, id 60693, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa7b8), seq 9:17, ack 9, win 227, options [nop,nop,TS val 590230813 ecr 50526732], length 8: OpenFlow
|
|
version 1.0, type FEATURES_REQUEST, length 8, xid 0x00000002
|
|
11 16:11:54.298928 IP (tos 0x0, ttl 55, id 49499, offset 0, flags [DF], proto TCP (6), length 52)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [.], cksum 0xa93e (correct), seq 9, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 0
|
|
12 16:11:54.299530 IP (tos 0x0, ttl 55, id 49500, offset 0, flags [DF], proto TCP (6), length 468)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xff61 (correct), seq 9:425, ack 17, win 115, options [nop,nop,TS val 50526733 ecr 590230813], length 416: OpenFlow
|
|
version 1.0, type FEATURES_REPLY, length 416, xid 0x00000002
|
|
dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
|
|
capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
|
|
actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
|
|
port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
|
|
config 0x80000001 (PORT_DOWN) (bogus)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
|
|
config 0x80000001 (PORT_DOWN) (bogus)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
13 16:11:54.303020 IP (tos 0x0, ttl 64, id 60694, offset 0, flags [DF], proto TCP (6), length 136)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a38 (incorrect -> 0xa414), seq 17:101, ack 425, win 235, options [nop,nop,TS val 590230815 ecr 50526733], length 84: OpenFlow
|
|
version 1.0, type SET_CONFIG, length 12, xid 0x00000003
|
|
flags FRAG_NORMAL, miss_send_len 65535
|
|
version 1.0, type FLOW_MOD, length 72, xid 0x00000004
|
|
cookie 0x0000000000000000, command DELETE, out_port NONE, flags 0x0000
|
|
14 16:11:54.304964 IP (tos 0x0, ttl 64, id 60695, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa5a0), seq 101:109, ack 425, win 235, options [nop,nop,TS val 590230816 ecr 50526733], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000005
|
|
15 16:11:54.307353 IP (tos 0x0, ttl 55, id 49501, offset 0, flags [DF], proto TCP (6), length 140)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8297 (correct), seq 425:513, ack 109, win 115, options [nop,nop,TS val 50526735 ecr 590230815], length 88: OpenFlow
|
|
version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffd
|
|
match in_port 16
|
|
cookie 0x0000000000000001, priority 33000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
|
|
16 16:11:54.344876 IP (tos 0x0, ttl 64, id 60696, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa661), seq 109, ack 513, win 235, options [nop,nop,TS val 590230828 ecr 50526735], length 0
|
|
17 16:11:54.350268 IP (tos 0x0, ttl 55, id 49502, offset 0, flags [DF], proto TCP (6), length 236)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x6fdb (correct), seq 513:697, ack 109, win 115, options [nop,nop,TS val 50526745 ecr 590230828], length 184: OpenFlow
|
|
version 1.0, type FLOW_REMOVED, length 88, xid 0x00000ffe
|
|
match in_port 18
|
|
cookie 0x0000000000000002, priority 31000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
|
|
version 1.0, type FLOW_REMOVED, length 88, xid 0x00000fff
|
|
match in_port 22
|
|
cookie 0x0000000000000003, priority 30000, reason DELETE, duration_sec 53, duration_nsec 990000000, packet_count 0, byte_count 0
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000005
|
|
18 16:11:54.350320 IP (tos 0x0, ttl 64, id 60697, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa596), seq 109, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 0
|
|
19 16:11:54.351010 IP (tos 0x0, ttl 64, id 60698, offset 0, flags [DF], proto TCP (6), length 140)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a3c (incorrect -> 0x41fa), seq 109:197, ack 697, win 243, options [nop,nop,TS val 590230829 ecr 50526745], length 88: OpenFlow
|
|
version 1.0, type VENDOR, length 20, xid 0x00000006, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SET_MIRRORING, report_mirror_ports ON
|
|
version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
|
|
version 1.0, type VENDOR, length 20, xid 0x00000008, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SET_MIRRORING, report_mirror_ports OFF
|
|
version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype GET_MIRRORING_REQUEST, report_mirror_ports OFF
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000a
|
|
20 16:11:54.354984 IP (tos 0x0, ttl 55, id 49503, offset 0, flags [DF], proto TCP (6), length 72)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8c59 (correct), seq 697:717, ack 197, win 115, options [nop,nop,TS val 50526747 ecr 590230829], length 20: OpenFlow
|
|
version 1.0, type VENDOR, length 20, xid 0x00000007, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype GET_MIRRORING_REPLY, report_mirror_ports ON
|
|
21 16:11:54.394872 IP (tos 0x0, ttl 64, id 60699, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa51a), seq 197, ack 717, win 243, options [nop,nop,TS val 590230843 ecr 50526747], length 0
|
|
22 16:11:54.397140 IP (tos 0x0, ttl 55, id 49504, offset 0, flags [DF], proto TCP (6), length 80)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8bfd (correct), seq 717:745, ack 197, win 115, options [nop,nop,TS val 50526758 ecr 590230843], length 28: OpenFlow
|
|
version 1.0, type VENDOR, length 20, xid 0x00000009, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype GET_MIRRORING_REPLY, report_mirror_ports OFF
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000a
|
|
23 16:11:54.397175 IP (tos 0x0, ttl 64, id 60700, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa4f3), seq 197, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 0
|
|
24 16:11:54.397593 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 80)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a00 (incorrect -> 0xa165), seq 197:225, ack 745, win 243, options [nop,nop,TS val 590230843 ecr 50526758], length 28: OpenFlow
|
|
version 1.0, type FEATURES_REQUEST, length 8, xid 0x0000000b
|
|
version 1.0, type STATS_REQUEST, length 12, xid 0x0000000c
|
|
type TABLE, flags 0x0000
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000d
|
|
25 16:11:54.400666 IP (tos 0x0, ttl 55, id 49505, offset 0, flags [DF], proto TCP (6), length 468)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xfb70 (correct), seq 745:1161, ack 225, win 115, options [nop,nop,TS val 50526759 ecr 590230843], length 416: OpenFlow
|
|
version 1.0, type FEATURES_REPLY, length 416, xid 0x0000000b
|
|
dpid 0x0000001c737d280f, n_buffers 0, n_tables 1
|
|
capabilities 0x000000c7 (FLOW_STATS, TABLE_STATS, PORT_STATS, QUEUE_STATS, ARP_MATCH_IP)
|
|
actions 0x00000905 (OUTPUT, SET_VLAN_PCP, SET_NW_TOS, ENQUEUE)
|
|
port_no 16, hw_addr 00:1c:73:7d:28:1f, name 'Ethernet16'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 20, hw_addr 00:1c:73:7d:28:23, name 'Ethernet20'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 18, hw_addr 00:1c:73:7d:28:21, name 'Ethernet18'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 22, hw_addr 00:1c:73:7d:28:25, name 'Ethernet22'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 17, hw_addr 00:1c:73:7d:28:20, name 'Ethernet17'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 21, hw_addr 00:1c:73:7d:28:24, name 'Ethernet21'
|
|
config 0x80000001 (PORT_DOWN) (bogus)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000cc0 (10GB_FD, COPPER, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 19, hw_addr 00:1c:73:7d:28:22, name 'Ethernet19'
|
|
config 0x00000001 (PORT_DOWN)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
port_no 23, hw_addr 00:1c:73:7d:28:26, name 'Ethernet23'
|
|
config 0x80000001 (PORT_DOWN) (bogus)
|
|
state 0x00000001 (STP_LISTEN, LINK_DOWN)
|
|
curr 0x00000040 (10GB_FD)
|
|
advertised 0x00000000
|
|
supported 0x00000c40 (10GB_FD, PAUSE, PAUSE_ASYM)
|
|
peer 0x00000000
|
|
26 16:11:54.438231 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa320), seq 225, ack 1161, win 252, options [nop,nop,TS val 590230856 ecr 50526759], length 0
|
|
27 16:11:54.442822 IP (tos 0x0, ttl 55, id 49506, offset 0, flags [DF], proto TCP (6), length 136)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4ea6 (correct), seq 1161:1245, ack 225, win 115, options [nop,nop,TS val 50526769 ecr 590230856], length 84: OpenFlow
|
|
version 1.0, type STATS_REPLY, length 76, xid 0x0000000c
|
|
type TABLE, flags 0x0000
|
|
table_id 0, name 'Table 0'
|
|
wildcards 0x003fffff (IN_PORT, DL_VLAN, DL_SRC, DL_DST, DL_TYPE, NW_PROTO, TP_SRC, TP_DST, DL_VLAN_PCP, NW_TOS)
|
|
max_entries 1500, active_count 0, lookup_count 0, matched_count 0
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000d
|
|
28 16:11:54.442855 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa2c1), seq 225, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 0
|
|
29 16:11:54.443433 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa189), seq 225:233, ack 1245, win 252, options [nop,nop,TS val 590230857 ecr 50526769], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000e
|
|
30 16:11:54.445977 IP (tos 0x0, ttl 55, id 49507, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa208 (correct), seq 1245:1253, ack 233, win 115, options [nop,nop,TS val 50526770 ecr 590230857], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000e
|
|
31 16:11:54.446147 IP (tos 0x0, ttl 64, id 60705, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa176), seq 233:241, ack 1253, win 252, options [nop,nop,TS val 590230858 ecr 50526770], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x0000000f
|
|
32 16:11:54.448750 IP (tos 0x0, ttl 55, id 49508, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1f5 (correct), seq 1253:1261, ack 241, win 115, options [nop,nop,TS val 50526771 ecr 590230858], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x0000000f
|
|
33 16:11:54.448907 IP (tos 0x0, ttl 64, id 60706, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa163), seq 241:249, ack 1261, win 252, options [nop,nop,TS val 590230859 ecr 50526771], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000010
|
|
34 16:11:54.451413 IP (tos 0x0, ttl 55, id 49509, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1e3 (correct), seq 1261:1269, ack 249, win 115, options [nop,nop,TS val 50526771 ecr 590230859], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000010
|
|
35 16:11:54.451718 IP (tos 0x0, ttl 64, id 60707, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa151), seq 249:257, ack 1269, win 252, options [nop,nop,TS val 590230860 ecr 50526771], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000011
|
|
36 16:11:54.454979 IP (tos 0x0, ttl 55, id 49510, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1d0 (correct), seq 1269:1277, ack 257, win 115, options [nop,nop,TS val 50526772 ecr 590230860], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000011
|
|
37 16:11:54.455181 IP (tos 0x0, ttl 64, id 60708, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa13e), seq 257:265, ack 1277, win 252, options [nop,nop,TS val 590230861 ecr 50526772], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000012
|
|
38 16:11:54.458795 IP (tos 0x0, ttl 55, id 49511, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1bd (correct), seq 1277:1285, ack 265, win 115, options [nop,nop,TS val 50526773 ecr 590230861], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000012
|
|
39 16:11:54.459026 IP (tos 0x0, ttl 64, id 60709, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0xa12b), seq 265:273, ack 1285, win 252, options [nop,nop,TS val 590230862 ecr 50526773], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000013
|
|
40 16:11:54.461429 IP (tos 0x0, ttl 55, id 49512, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa1aa (correct), seq 1285:1293, ack 273, win 115, options [nop,nop,TS val 50526774 ecr 590230862], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000013
|
|
41 16:11:54.461743 IP (tos 0x0, ttl 64, id 60710, offset 0, flags [DF], proto TCP (6), length 120)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3a28 (incorrect -> 0x9a6c), seq 273:341, ack 1293, win 252, options [nop,nop,TS val 590230863 ecr 50526774], length 68: OpenFlow
|
|
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000014
|
|
port 16
|
|
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000015
|
|
port 20
|
|
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000016
|
|
port 18
|
|
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000017
|
|
port 22
|
|
version 1.0, type QUEUE_GET_CONFIG_REQUEST, length 12, xid 0x00000018
|
|
port 17
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000019
|
|
42 16:11:54.464033 IP (tos 0x0, ttl 55, id 49513, offset 0, flags [DF], proto TCP (6), length 68)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0xa139 (correct), seq 1293:1309, ack 341, win 115, options [nop,nop,TS val 50526775 ecr 590230863], length 16: OpenFlow
|
|
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000014
|
|
port 16
|
|
43 16:11:54.501564 IP (tos 0x0, ttl 64, id 60711, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1f5), seq 341, ack 1309, win 252, options [nop,nop,TS val 590230875 ecr 50526775], length 0
|
|
44 16:11:54.504038 IP (tos 0x0, ttl 55, id 49514, offset 0, flags [DF], proto TCP (6), length 124)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9bb5 (correct), seq 1309:1381, ack 341, win 115, options [nop,nop,TS val 50526785 ecr 590230875], length 72: OpenFlow
|
|
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000015
|
|
port 20
|
|
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000016
|
|
port 18
|
|
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000017
|
|
port 22
|
|
version 1.0, type QUEUE_GET_CONFIG_REPLY, length 16, xid 0x00000018
|
|
port 17
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000019
|
|
45 16:11:54.504155 IP (tos 0x0, ttl 64, id 60712, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0xa1a3), seq 341, ack 1381, win 252, options [nop,nop,TS val 590230875 ecr 50526785], length 0
|
|
46 16:11:54.505352 IP (tos 0x0, ttl 64, id 60713, offset 0, flags [DF], proto TCP (6), length 562)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x3be2 (incorrect -> 0x4d80), seq 341:851, ack 1381, win 252, options [nop,nop,TS val 590230876 ecr 50526785], length 510: OpenFlow
|
|
version 1.0, type VENDOR, length 24, xid 0x0000001a, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SET_IP_MASK, index 1, mask 255.0.14.0
|
|
version 1.0, type VENDOR, length 24, xid 0x0000001b, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SET_IP_MASK, index 2, mask 255.0.28.0
|
|
version 1.0, type VENDOR, length 24, xid 0x0000001c, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SET_IP_MASK, index 3, mask 255.0.56.0
|
|
version 1.0, type VENDOR, length 24, xid 0x0000001d, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SET_IP_MASK, index 4, mask 255.0.112.0
|
|
version 1.0, type VENDOR, length 24, xid 0x0000001e, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SET_IP_MASK, index 5, mask 255.0.224.0
|
|
version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype GET_IP_MASK_REQUEST, index 3
|
|
version 1.0, type VENDOR, length 30, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SHELL_COMMAND, service 0, data 'show clock'
|
|
version 1.0, type FLOW_MOD, length 104, xid 0x00000021
|
|
match in_port 16
|
|
cookie 0x0000000000000001, command ADD, priority 33000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
|
|
action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype MIRROR, dest_port 21, vlan_tag none, copy_stage INGRESS
|
|
action type OUTPUT, len 8, port 17
|
|
version 1.0, type FLOW_MOD, length 128, xid 0x00000022
|
|
match in_port 18
|
|
cookie 0x0000000000000002, command ADD, priority 31000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
|
|
action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 2, p 4), copy_stage INGRESS
|
|
action type OUTPUT, len 8, port 19
|
|
action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype MIRROR, dest_port 23, vlan_tag 802.1Q (vlan 2748, p 5, DEI), copy_stage EGRESS
|
|
version 1.0, type FLOW_MOD, length 96, xid 0x00000023
|
|
match in_port 22
|
|
cookie 0x0000000000000003, command ADD, priority 30000, buffer_id NONE, flags 0x0001 (SEND_FLOW_REM)
|
|
action type VENDOR, len 24, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype MIRROR, dest_port 21, vlan_tag 802.1Q (vlan 0, p 1), copy_stage INGRESS
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000024
|
|
47 16:11:54.508061 IP (tos 0x0, ttl 55, id 49515, offset 0, flags [DF], proto TCP (6), length 76)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x4da3 (correct), seq 1381:1405, ack 851, win 123, options [nop,nop,TS val 50526786 ecr 590230876], length 24: OpenFlow
|
|
version 1.0, type VENDOR, length 24, xid 0x0000001f, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype GET_IP_MASK_REPLY, index 3, mask 255.0.56.0
|
|
48 16:11:54.544912 IP (tos 0x0, ttl 64, id 60714, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f7f), seq 851, ack 1405, win 252, options [nop,nop,TS val 590230888 ecr 50526786], length 0
|
|
49 16:11:54.549108 IP (tos 0x0, ttl 55, id 49516, offset 0, flags [DF], proto TCP (6), length 80)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x8632 (correct), seq 1405:1433, ack 851, win 123, options [nop,nop,TS val 50526795 ecr 590230888], length 28: OpenFlow
|
|
version 1.0, type VENDOR, length 20, xid 0x00000020, vendor 0x005c16c7 (Big Switch Networks)
|
|
subtype SHELL_STATUS, status 0xfffffffe
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000024
|
|
50 16:11:54.549207 IP (tos 0x0, ttl 64, id 60715, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f59), seq 851, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 0
|
|
51 16:11:54.549472 IP (tos 0x0, ttl 64, id 60716, offset 0, flags [DF], proto TCP (6), length 60)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [P.], cksum 0x39ec (incorrect -> 0x9e0a), seq 851:859, ack 1433, win 252, options [nop,nop,TS val 590230889 ecr 50526795], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REQUEST, length 8, xid 0x00000025
|
|
52 16:11:54.552183 IP (tos 0x0, ttl 55, id 49517, offset 0, flags [DF], proto TCP (6), length 60)
|
|
88.150.169.52.4756 > 109.74.202.168.6653: Flags [P.], cksum 0x9e80 (correct), seq 1433:1441, ack 859, win 123, options [nop,nop,TS val 50526797 ecr 590230889], length 8: OpenFlow
|
|
version 1.0, type BARRIER_REPLY, length 8, xid 0x00000025
|
|
53 16:11:54.591537 IP (tos 0x0, ttl 64, id 60717, offset 0, flags [DF], proto TCP (6), length 52)
|
|
109.74.202.168.6653 > 88.150.169.52.4756: Flags [.], cksum 0x39e4 (incorrect -> 0x9f3a), seq 859, ack 1441, win 252, options [nop,nop,TS val 590230902 ecr 50526797], length 0
|