SC_SPEEDTRAP(1) | General Commands Manual | SC_SPEEDTRAP(1) |
sc_speedtrap
—
scamper driver to resolve aliases for a set of IPv6
interfaces.
sc_speedtrap |
[-I ]
[-a addressfile]
[-A aliasfile]
[-l logfile]
[-o outfile]
[-p port]
[-s stop]
[-S skipfile]
[-U unix-socket] |
sc_speedtrap |
[-d dump]
[file ...] |
The sc_speedtrap
utility provides the
ability to connect to a running scamper(1) instance and
use it to collect data for alias resolution of a set of IPv6 addresses using
the "speedtrap" technique. sc_speedtrap
induces each address to send fragmented ICMP echo replies, with the goal of
obtaining an incrementing Identifier (ID) field in the fragmentation header.
If two addresses are aliases, they will return ICMP echo replies with a
monotonically increasing value in the ID field because the ID field is
implemented as a counter shared amongst all interfaces.
sc_speedtrap
implements a scalable algorithm to
quickly determine which addresses are aliases. Further information about the
algorithm is found in the "see also" section. The supported
options to sc_speedtrap
are as follows:
-a
addressfile-A
aliasfile-d
dump-I
-l
logfilesc_speedtrap
generated at run time.-o
outfile-p
port-s
stopsc_speedtrap
should
halt. The available steps are "classify", "descend",
"overlap", "descend2", "candidates", and
"ally".-S
skipfile-U
unix-socketGiven a set of IPv6 addresses contained in a file named addressfile.txt and a scamper process listening on port 31337 configured to probe at 30 packets per second started as follows:
scamper -P 31337 -p 30
the following command will resolve the addresses for aliases, store the raw measurements in outfile1.warts, and record the interface-pairs that are aliases in aliases.txt:
sc_speedtrap -p 31337 -a
addressfile.txt -o outfile1.warts -A aliases.txt
The next example is useful when inferring aliases from multiple vantage points. Given the output of aliases.txt from a previous measurement, the following will resolve the addressfile for aliases, skipping those in aliases.txt, and appending the new aliases to aliases.txt:
sc_speedtrap -p 31337 -a
addressfile.txt -o outfile2.warts -A aliases.txt -S aliases.txt
To obtain a transitive closure of routers from an input warts file:
sc_speedtrap -d 1
outfile1.warts
To obtain a list of the interfaces probed and their IPID behaviour:
sc_speedtrap -d 2
outfile1.warts
To obtain statistics of how many probes are sent in each stage, and how long the stage takes:
sc_speedtrap -d 3
outfile1.warts
M. Luckie, R. Beverly, W. Brinkmeyer, and k. claffy, Speedtrap: Internet-scale IPv6 Alias Resolution, Proc. ACM/SIGCOMM Internet Measurement Conference 2013. scamper(1), sc_ally(1), sc_ipiddump(1), sc_wartsdump(1), sc_warts2text(1), sc_warts2json(1),
sc_speedtrap
was written by Matthew Luckie
<mjl@luckie.org.nz>.
August 18, 2013 | Debian |