sniffer User Manual | ||
---|---|---|
<<< Previous | Scripting | Next >>> |
NOTE: All integer variables are properly converted from network to host byte order before values are loaded into script interpreter, so you don't have to worry about it.
Contains length of the packet (headers + contents) as the decimal integer.
This is exact time the packet was received by the sniffer. This variable contains number of seconds elapsed since the epoch (system-dependent), but Tcl has builtin functions for formatting this value into human-readable format (man n clock).
For now, this field is always "ethernet". Later, when we add support for other types of packets this field will be set accordingly.
Source address (MAC) of the packet in the form "xx:xx:xx:xx:xx:xx" (string)
Destination MAC address of the packet
Protocol carried within this ethernet frame (ip, ...). This variable contains decimal ethernet code in host byte order (0x0800 for IP, for example)
Integer value representing IP version (I guess 4 or 6 currently)
Integer value of internet header length
Type Of Service field
Total length of the IP packet (headers + contents)
Packet ID field
Fragment offset if packet is fragmented
Time To Live field
Protocol carried within this packet (tcp, udp, ...). For easier interpreting of this field, there is an array variable $ip_proto defined in the default configuration (sample.ss). Protocol name is used as an array index ($ip_proto(tcp), for example, returns TCP protocol code (6)).
Packet checksum
Source address as dot quaded string or, if so specified on command line, fully qualified domain name of the source host.
Destination address (look ip(saddr) for more info)
Hex dump of the packet data in the form "xx xx xx ..." where xx are hexadecimal digits
ASCII dump of the packet data. If byte is within printable range then it is displayed literally. If it's non-printable then only "." (dot) is shown.
Length of the packet contents (bytes/chars in hex or ascii dump)
NOTE: support for IP header flags in frag_off field is not yet supported.
Source port (integer)
Destination port (integer)
Sequence number (long)
Acknowledgement sequence number (long)
Data offset
finish flag (0 or 1)
sync flag (0 or 1)
reset flag (0 or 1)
psh flag (0 or 1)
ack flag (0 or 1)
urgent flag
window
Packet checksum
urgent pointer
hex dump of the packet data (see ip(hex_dump) for more info)
ascii dump of the packet data (see ip(ascii_dump) for more info)
length of the packet data
Source port
Destination port
Packet length
Packet checksum
hex dump of the packet data (see ip(hex_dump) for more info)
ascii dump of the packet data (see ip(ascii_dump) for more info)
length of the packet data
icmp packet type (decimal code)
icmp packet type (text description)
icmp packet sub-type code (decimal)
icmp packet sub-type code (text description)
icmp packet checksum
ID in echo request/reply type packets
hex dump of the packet data (see ip(hex_dump) for more info)
ascii dump of the packet data (see ip(ascii_dump) for more info)
Length of the packet data
<<< Previous | Home | Next >>> |
Event handler hooks | Up | Functions |