SC_RADARGUN(1) | General Commands Manual | SC_RADARGUN(1) |
sc_radargun
—
scamper driver to run radargun on a list of candidate
aliases.
sc_radargun |
[-?D ]
[-a infile]
[-f fudge]
[-o outfile]
[-O options]
[-p port]
[-P pps]
[-q attempts]
[-r wait-round]
[-R round-count]
[-t logfile]
[-U unix] |
sc_radargun |
[-d
dump] data-file |
The sc_radargun
utility provides the
ability to connect to a running scamper(1) instance and
infer which of the supplied IPv4 addresses are aliases using the Radargun
technique. For all addresses in the file,
sc_radargun
establishes which probe methods (UDP,
TCP-ack, ICMP-echo) solicit an incrementing IP-ID value, and then uses the
Radargun technique on addresses where a probe method is able to obtain an
incrementing IP-ID for the addresses. The output is written to a warts file.
The options are as follows:
-
?-D
sc_radargun
to detach and become a
daemon.-a
infile-d
dump-f
fudge-o
outfile-O
optionssc_radargun
to be further
tailored. The current choices for this option are:
-p
port-P
pps-q
attempts-r
wait-round-R
round-count-t
logfilesc_radargun
generated at run time.-U
unixsc_radargun
requires a
scamper(1) instance listening on a port for commands in
order to collect data, at 20 packets per second:
scamper -P 31337 -p 20
will start a scamper(1) instance listening on
port 31337 on the loopback interface. To use
sc_radargun
to infer which addresses might be
aliases, listed in a file named set-1.txt
192.0.2.2 192.0.32.10 192.0.30.64 192.0.31.8
the following command will test these IP addresses for aliases using ICMP, UDP, and TCP probes (as appropriate) using the radargun technique with 10 rounds, each round taking 4 seconds:
sc_radargun -a set-1.txt -o set-1.warts -p 20 -r 4 -R 10
To use sc_radargun
to infer which
addresses might be aliases, listed in a file named set-2.txt organized as
sets of candidate aliases to test:
192.0.2.2 192.0.32.10 192.0.30.64 192.0.31.8 192.0.2.3 192.0.32.11 192.0.30.65 192.0.31.9
the following command will test these organized sets of IP addresses for aliases:
sc_radargun -a set-2.txt -o set-2.warts -p 20 -O rows
To use data previously collected with
sc_radargun
and stored in set-2.warts, to infer
likely aliases, reported in pairs:
sc_radargun -d 1 set-2.warts
To use data previously collected with
sc_radargun
and stored in set-2.warts, to report
interface IP-ID classifications:
sc_radargun -d 2 set-2.warts
A. Bender, R. Sherwood, and N. Spring, Fixing Ally's growing pains with velocity modeling, Proc ACM Internet Measurement Conference 2008. scamper(1), sc_ally(1), sc_wartsdump(1), sc_warts2json(1)
sc_radargun
was written by Matthew Luckie
<mjl@luckie.org.nz>, but the original implementation was by Bender et
al.
November 21, 2017 | Debian |