Advertisement
Guest User

Untitled

a guest
Apr 10th, 2010
243
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.27 KB | None | 0 0
  1. An ubuntu-desktop machine(call it A) outputs RTP traffic to 224.0.0.56
  2.  
  3. It is able to see its own traffic:
  4. A:~$ sudo tcpdump -n net 224.0.0.0/8 -c 10
  5. [sudo] password for vegar:
  6. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  7. listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
  8. 22:43:33.254962 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  9. 22:43:33.267653 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  10. 22:43:33.267673 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  11. 22:43:33.281077 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  12. 22:43:33.281102 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  13. 22:43:33.293753 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  14. 22:43:33.293770 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  15. 22:43:33.312635 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  16. 22:43:33.312702 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  17. 22:43:33.319869 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  18. 10 packets captured
  19. 12 packets received by filter
  20. 0 packets dropped by kernel
  21.  
  22. Another ubuntu-desktop machine(B) can see the same traffic pattern(and can play back the audio):
  23. B:~$ sudo tcpdump -n net 224.0.0.0/8 -c 10 -i wlan0
  24. [sudo] password for vegar:
  25. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  26. listening on wlan0, link-type EN10MB (Ethernet), capture size 96 bytes
  27. 22:39:49.704724 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  28. 22:39:49.705388 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  29. 22:39:49.718085 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  30. 22:39:49.718771 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  31. 22:39:49.730973 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  32. 22:39:49.744882 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  33. 22:39:49.756907 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  34. 22:39:49.757606 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  35. 22:39:49.770266 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  36. 22:39:49.770945 IP 10.0.1.142.56485 > 224.0.0.56.46788: UDP, length 1292
  37. 10 packets captured
  38. 10 packets received by filter
  39. 0 packets dropped by kernel
  40.  
  41. However, the ubuntu-server machine(C) sees this:
  42. :~$ sudo tcpdump -n net 224.0.0.0/8 -c 10
  43. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  44. listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
  45. 22:40:27.334291 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  46. 22:40:32.333530 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  47. 22:40:37.332805 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  48. 22:40:42.332062 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  49. 22:40:47.331331 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  50. 22:40:52.330599 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  51. 22:40:57.329858 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  52. 22:41:02.329125 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  53. 22:41:07.328388 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  54. 22:41:12.327657 IP 10.0.1.142.50500 > 224.0.0.56.9875: UDP, length 220
  55. 10 packets captured
  56. 10 packets received by filter
  57. 0 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement