| SC_PREFIXSCAN(1) | General Commands Manual | SC_PREFIXSCAN(1) |
sc_prefixscan —
scamper driver to test if a set of IPv4 links are
point-to-point.
sc_prefixscan |
[-D]
[-i infile]
[-o outfile]
[-p port]
[-l logfile]
[-U unix-socket]
[-w wait]
[-x prefixlen] |
sc_prefixscan |
[-r data-file]
[-x prefixlen] |
The sc_prefixscan utility provides the
ability to connect to a running scamper(1) instance and
use it to collect data to infer if an IPv4 link is likely a point-to-point
link using the prefixscan method. An address B is the in-bound interface of
a router in a traceroute path if we find an alias A' of the address A
returned for the previous hop and A' is a /31 or /30 mate of B, i.e. the
link between A and B is a point-to-point link. The prefixscan method infers
A and A' are aliases if the IPIDs in responses to five alternating probes
sent one second apart monotonically increase and differ by no more than
1,000, or probes to A and A' elicit responses with a common source address.
The first technique is a pairwise comparison similar to Ally, and the second
is the Mercator technique. The supported options to
sc_prefixscan are as follows:
-Dsc_prefixscan to detach and become a
daemon.-i
infile-o
outfile-p
port-l
logfilesc_prefixscan generated at run time.-r
data-filesc_prefixscan in
a previous data collection.-U
unix-socket-w
waitsc_prefixscan waits five seconds between
methods.-x
prefixlensc_prefixscan considers up to an IPv4 /30
prefix.Given a traceroute with the following path:
traceroute to
192.0.30.641 192.0.2.12 192.0.32.103 192.0.31.84 192.0.30.64then to collect data to infer if the implied IPv4 links are point-to-point, put the links in a file named infile.txt formatted as follows:
192.0.2.1 192.0.32.10192.0.32.10 192.0.31.8192.0.31.8 192.0.30.64and use a scamper(1) daemon listening on port 31337 using:
sc_prefixscan -i infile.txt -o
outfile.warts -p 31337To obtain the inferred point-to-point links from outfile.warts:
sc_prefixscan -r
outfile.wartsscamper(1), sc_ally(1), sc_ipiddump(1), sc_wartsdump(1), sc_warts2text(1), sc_warts2json(1),
M. Luckie and k. claffy, A Second Look at Detecting Third-party Addresses in Traceroute Traces with the IP Timestamp Option, Proc. Passive and Active Measurement Conference 2014.
R. Govindan and H. Tangmunarunkit, Heuristics for Internet Map Discovery, Proc. IEEE INFOCOM 2000.
N. Spring, R. Mahajan, and D. Wetherall, Measuring ISP topologies with Rocketfuel, Proc. ACM SIGCOMM 2002.
sc_prefixscan was written by Matthew
Luckie <mjl@luckie.org.nz>.
| December 2, 2016 | Debian |