- # yum install `curl -s http://apt.sw.be/redhat/el7/en/x86_64/rpmforge/RPMS/|grep -o '"tcpflow[^"]*'|sed 's|"|http://apt.sw.be/redhat/el7/en/x86_64/rpmforge/RPMS/|'`
- Dependencies Resolved
- ======================================================================================================================================
- Package Arch Version Repository Size
- ======================================================================================================================================
- Installing:
- tcpflow x86_64 0.21-1.2.el7.rf /tcpflow-0.21-1.2.el7.rf.x86_64 61 k
- Transaction Summary
- ======================================================================================================================================
- Install 1 Package
- Is this ok [y/d/N]: y
- Downloading packages:
- Running transaction check
- Running transaction test
- Transaction test succeeded
- Running transaction
- Installing : tcpflow-0.21-1.2.el7.rf.x86_64 1/1
- Verifying : tcpflow-0.21-1.2.el7.rf.x86_64 1/1
- Installed:
- tcpflow.x86_64 0:0.21-1.2.el7.rf
- Complete!
eth0の80番ポートのパケットを試しにキャプチャ
※-cでコンソール出力,-sで表示できない文字を.で表示
ELBからのヘルスチェックのリクエスト&レスポンスが取得されました。
- # tcpflow -cs -i eth0 port 80
- tcpflow[6577]: listening on eth0
- 010.000.012.250.26633-010.000.022.012.00080: GET / HTTP/1.1
- host: 10.0.22.12
- User-Agent: ELB-HealthChecker/1.0
- Accept: */*
- Connection: keep-alive
- 010.000.022.012.00080-010.000.012.250.26633: HTTP/1.1 200 OK
- Date: Mon, 08 Feb 2016 03:34:19 GMT
- Server: Apache
- Content-Type: text/plain;charset=ISO-8859-1
- Content-Length: 0
- Keep-Alive: timeout=5, max=100
- Connection: Keep-Alive
manpage
- # man tcpflow
- tcpflow(1)
- NAME
- tcpflow - TCP flow recorder
- SYNOPSIS
- tcpflow [-chpsv] [-b max_bytes] [-d debug_level] [-f max_fds] [-i iface] [-r file] [expression]
- DESCRIPTION
- tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging. A program like tcpdump(4) shows a summary of pack‐
- ets seen on the wire, but usually doesn't store the data that's actually being transmitted. In contrast, tcpflow reconstructs the actual data streams and stores each flow in a separate file for later analysis. tcpflow
- understands TCP sequence numbers and will correctly reconstruct data streams regardless of retransmissions or out-of-order delivery.
- tcpflow stores all captured data in files that have names of the form
- 192.168.101.102.02345-010.011.012.013.45103
- where the contents of the above file would be data transmitted from host 192.168.101.102 port 2345, to host 10.11.12.13 port 45103.
- OPTIONS
- -b Max bytes per flow. Capture no more than max_bytes bytes per flow. Any data captured for a flow beyond max_bytes from the first byte captured will be discarded. The default is to store an unlimited number of bytes
- per flow.
- -c Console print. Print the contents of packets to stdout as they are received, without storing any captured data to files (implies -s ).
- -d Debug level. Set the level of debugging messages printed to stderr to debug_level. Higher numbers produce more messages. -d 0 causes completely silent operation. -d 1 , the default, produces minimal status mes‐
- sages. -d 10 produces verbose output equivalent to -v . Numbers higher than 10 can produce a large amount of debugging information useful only to developers.
- -f Max file descriptors used. Limit the number of file descriptors used by tcpflow to max_fds. Higher numbers use more system resources, but usually perform better. If the underlying operating system supports the
- setrlimit() system call, the OS will be asked to enforce the requested limit. The default is for tcpflow to use the maximum number of file descriptors allowed by the OS. The -v option will report how many file
- descriptors tcpflow is using.
- -h Help. Print usage information and exit.
- -i Interface name. Capture packets from the network interface named iface. If no interface is specified with -i , a reasonable default will be used by libpcap automatically.
- -p No promiscuous mode. Normally, tcpflow attempts to put the network interface into promiscuous mode before capturing packets. The -p option tells tcpflow not to put the interface into promiscuous mode. Note that it
- might already be in promiscuous mode for some other reason.
- -r Read from file. Read packets from file, which was created using the -w option of tcpdump(1). Standard input is used if file is ``-''. Note that for this option to be useful, tcpdump's -s option should be used to
- set the snaplen to the MTU of the interface (e.g., 1500) while capturing packets.
- -s Strip non-printables. Convert all non-printable characters to the "." character before printing packets to the console or storing them to a file.
- -v Verbose operation. Verbosely describe tcpflow's operation. Equivalent to -d 10 .
0 件のコメント:
コメントを投稿