-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for parsing Eth-Over-GRE #27
Comments
@igorribeiroduarte I was unable to reproduce this so far, could you try with something similar to this below, using the same pcap?
|
@cardigliano, using pfsend npcapprintindex showed tunneled ipv4:
|
Could you provide one of the pcap files n2disk is capturing from live traffic? I guess your actual traffic does not have the same headers as gre-within-gre.pcap |
Sure. |
Please note this is not IP-over-GRE, this is Eth-over-GRE, which is not currently supported (we can add support for it) |
Right, thank you! |
I have another doubt. Also, can I use the inner keyword to any extraction? On a way that I can use |
Is there any configuration on n2disk that allows me to index the most inner GRE layer instead of the first one? |
n2disk indexes the first layer, we can add an option to index the deepest layer |
Right, thanks. |
inner should be used to look for the encapsulated layer |
I'm using two machines to reproduce this problem. One of them it's used just for sending the packets via tunnel and on the other one I'm running npcapextract and n2disk.
These are the steps to reproduce this issue:
Run n2disk on the first machine
n2disk1g -I -P /var/run/n2disk/n2disk.pid -G 1 -A index_folder -p 1024 -b 1024 -i ens18f0 --disk-limit 93% -t 15 -a -o /disco03 -o /disco04
Create a GRE tunnel on the second machine and replay the pcap to it
sudo modprobe ip_gre
sudo ip link add name ${tunnel_name} type gretap local 192.168.10.2 remote 192.168.10.3
sudo ip link set ${tunnel_name} up
sudo tcpreplay -i ${tunnel_name} --mbps 10 -K --loop 1 gre-within-gre.pcap
On the first machine, try to extract the desired packets with npcapextract using inner host and/or inner port
npcapextract -u root -t index_folder -b '2020-05-25 16:18:56' -e '2020-05-25 16:19:31' -o test.pcap -f '(inner host 224.0.0.9 and inner port 520) and (inner host 3.3.3.2 and inner port 520)'
npcapextract -u root -t index_folder -b '2020-05-25 16:18:56' -e '2020-05-25 16:19:31' -o test.pcap -f '(inner host 224.0.0.9)'
npcapextract -u root -t index_folder -b '2020-05-25 16:18:56' -e '2020-05-25 16:19:31' -o test.pcap -f '(inner host 3.3.3.1)'
npcapextract -u root -t index_folder -b '2020-05-25 16:18:56' -e '2020-05-25 16:19:31' -o test.pcap -f '(inner host 3.3.3.2)'
Neither of the above extractions worked
Also, when I run npcaprintindex on the machine where n2disk is running, i get:
As you can see, n2disk is not identifying the tunneled ipv4.
I can assure you that the problem is not with the tunnel, since I'm monitoring the network on the first machine and I can see the traffic I was replaying.
This is the pcap I used for these tests:
gre-within-gre.pcap.zip
n2disk version:
n2disk v.3.4.200414 (r5191)
pfring version:
7.6.0 (7.6.0-stable:0e07b27c0d593174584de79e273470366a91d307)
The text was updated successfully, but these errors were encountered: