Nmap Development mailing list archives
Re: npcap 1.50 receiving too many packets.
From: Daniel Miller <bonsaiviking () gmail com>
Date: Thu, 1 Jul 2021 11:52:11 -0500
Michael, Thanks for pointing this out. I'll investigate and get back to you. The extra packets I believe are "protocol unreachable" errors that we had previously been stripping out within Npcap. We had removed the code that stripped them from the packet stream in the interest of transparency and simplicity, so the solution is likely to restore that code, but I will investigate other ways as well. Dan On Thu, Jun 24, 2021 at 4:37 PM Michael D. Lawler <mdlawler () lawlers us> wrote:
This worked fine with 1.31 as the number of sent and received packets were equal. This is with Win 10 19043.1081. Let me know what I can do to help. Also notice the results are not always the same I show two runs below. Starting Nping 0.7.91 ( https://nmap.org/nping ) at 2021-06-24 17:28 Eastern Daylight Time SENT (0.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=6783 seq=1] IP [ttl=64 id=22972 iplen=28 ] SENT (1.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=6783 seq=2] IP [ttl=64 id=22972 iplen=28 ] RCVD (1.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=6783 seq=2] IP [ttl=128 id=58615 iplen=28 ] RCVD (1.0470s) ICMP [127.0.0.1 > 127.0.0.1 Protocol 1 unreachable (type=3/code=2) ] IP [ttl=128 id=58616 iplen=56 ] SENT (2.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=6783 seq=3] IP [ttl=64 id=22972 iplen=28 ] RCVD (2.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=6783 seq=3] IP [ttl=128 id=58617 iplen=28 ] RCVD (2.0470s) ICMP [127.0.0.1 > 127.0.0.1 Protocol 1 unreachable (type=3/code=2) ] IP [ttl=128 id=58618 iplen=56 ] SENT (3.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=6783 seq=4] IP [ttl=64 id=22972 iplen=28 ] RCVD (3.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=6783 seq=4] IP [ttl=128 id=58619 iplen=28 ] RCVD (3.0470s) ICMP [127.0.0.1 > 127.0.0.1 Protocol 1 unreachable (type=3/code=2) ] IP [ttl=128 id=58620 iplen=56 ] SENT (4.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=6783 seq=5] IP [ttl=64 id=22972 iplen=28 ] RCVD (4.0470s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=6783 seq=5] IP [ttl=128 id=58621 iplen=28 ] Max rtt: 0.000ms | Min rtt: 0.000ms | Avg rtt: 0.000ms Raw packets sent: 5 (210B) | Rcvd: 7 (280B) | Lost: 0 (0.00%) Nping done: 1 IP address pinged in 4.05 seconds Starting Nping 0.7.91 ( https://nmap.org/nping ) at 2021-06-24 17:36 Eastern Daylight Time SENT (0.0450s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=33119 seq=1] IP [ttl=64 id=38181 iplen=28 ] RCVD (0.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=33119 seq=1] IP [ttl=128 id=58633 iplen=28 ] RCVD (0.0460s) ICMP [127.0.0.1 > 127.0.0.1 Protocol 1 unreachable (type=3/code=2) ] IP [ttl=128 id=58634 iplen=56 ] SENT (1.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=33119 seq=2] IP [ttl=64 id=38181 iplen=28 ] RCVD (1.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=33119 seq=2] IP [ttl=128 id=58635 iplen=28 ] RCVD (1.0460s) ICMP [127.0.0.1 > 127.0.0.1 Protocol 1 unreachable (type=3/code=2) ] IP [ttl=128 id=58636 iplen=56 ] SENT (2.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=33119 seq=3] IP [ttl=64 id=38181 iplen=28 ] RCVD (2.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=33119 seq=3] IP [ttl=128 id=58637 iplen=28 ] RCVD (2.0460s) ICMP [127.0.0.1 > 127.0.0.1 Protocol 1 unreachable (type=3/code=2) ] IP [ttl=128 id=58638 iplen=56 ] SENT (3.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=33119 seq=4] IP [ttl=64 id=38181 iplen=28 ] RCVD (3.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=33119 seq=4] IP [ttl=128 id=58639 iplen=28 ] RCVD (3.0460s) ICMP [127.0.0.1 > 127.0.0.1 Protocol 1 unreachable (type=3/code=2) ] IP [ttl=128 id=58640 iplen=56 ] SENT (4.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo request (type=8/code=0) id=33119 seq=5] IP [ttl=64 id=38181 iplen=28 ] RCVD (4.0460s) ICMP [127.0.0.1 > 127.0.0.1 Echo reply (type=0/code=0) id=33119 seq=5] IP [ttl=128 id=58641 iplen=28 ] Max rtt: 0.000ms | Min rtt: 0.000ms | Avg rtt: 0.000ms Raw packets sent: 5 (210B) | Rcvd: 9 (364B) | Lost: 0 (0.00%) Nping done: 1 IP address pinged in 4.05 seconds -- Michael D. Lawler email mailto:mdlawler () lawlers us _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: npcap 1.50 receiving too many packets. Daniel Miller (Jul 01)