Packet Sniffer Code in C using Linux Sockets (BSD) – Part 2

简介:

In the previous part we made a simple sniffer which created a raw socket and started receiving on it. But it had few drawbacks :

1. Could sniff only incoming data.
2. Could sniff only TCP or UDP or ICMP or any one protocol packets at a time.
3. Provided IP frames , so ethernet headers were not available.

In this article we are going to modify the same code to fix the above 3 drawbacks. However we shall not be using libpcap.
This will be done using pure linux sockets.

The difference is very small and is 2 lines :
Instead of :

1
sock_raw = socket(AF_INET , SOCK_RAW , IPPROTO_TCP);

  We do :

1
2
3
sock_raw = socket( AF_PACKET , SOCK_RAW , htons(ETH_P_ALL)) ;
//Optional
//setsockopt(sock_raw , SOL_SOCKET , SO_BINDTODEVICE , "eth0" , strlen("eth0")+ 1 );

  

and we are done. Now it will :
1. Sniff both incoming and outgoing traffic.
2. Sniff ALL ETHERNET FRAMES , which includes all kinds of IP packets and even more if there are any.
3. Provides the Ethernet headers too , which contain the mac addresses.

The setsockopt line is optional.
Its important to provide the correct interface name to setsockopt , eth0 in this case and in most cases.
So may be you would like to present the user with a list of interfaces available and allow him to choose the one to be sniffed.

Here is the full source code :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
#include<netinet/in.h>
#include<errno.h>
#include<netdb.h>
#include<stdio.h> //For standard things
#include<stdlib.h>    //malloc
#include<string.h>    //strlen
 
#include<netinet/ip_icmp.h>   //Provides declarations for icmp header
#include<netinet/udp.h>   //Provides declarations for udp header
#include<netinet/tcp.h>   //Provides declarations for tcp header
#include<netinet/ip.h>    //Provides declarations for ip header
#include<netinet/if_ether.h>  //For ETH_P_ALL
#include<net/ethernet.h>  //For ether_header
#include<sys/socket.h>
#include<arpa/inet.h>
#include<sys/ioctl.h>
#include<sys/time.h>
#include<sys/types.h>
#include<unistd.h>
 
void  ProcessPacket(unsigned  char * ,  int );
void  print_ip_header(unsigned  char * ,  int );
void  print_tcp_packet(unsigned  char  * ,  int  );
void  print_udp_packet(unsigned  char  * ,  int  );
void  print_icmp_packet(unsigned  char * ,  int  );
void  PrintData (unsigned  char * ,  int );
 
FILE  *logfile;
struct  sockaddr_in source,dest;
int  tcp=0,udp=0,icmp=0,others=0,igmp=0,total=0,i,j;
 
int  main()
{
     int  saddr_size , data_size;
     struct  sockaddr saddr;
         
     unsigned  char  *buffer = (unsigned  char  *)  malloc (65536);  //Its Big!
     
     logfile= fopen ( "log.txt" , "w" );
     if (logfile==NULL)
     {
         printf ( "Unable to create log.txt file." );
     }
     printf ( "Starting...\n" );
     
     int  sock_raw = socket( AF_PACKET , SOCK_RAW , htons(ETH_P_ALL)) ;
     //setsockopt(sock_raw , SOL_SOCKET , SO_BINDTODEVICE , "eth0" , strlen("eth0")+ 1 );
     
     if (sock_raw < 0)
     {
         //Print the error with proper message
         perror ( "Socket Error" );
         return  1;
     }
     while (1)
     {
         saddr_size =  sizeof  saddr;
         //Receive a packet
         data_size = recvfrom(sock_raw , buffer , 65536 , 0 , &saddr , (socklen_t*)&saddr_size);
         if (data_size <0 )
         {
             printf ( "Recvfrom error , failed to get packets\n" );
             return  1;
         }
         //Now process the packet
         ProcessPacket(buffer , data_size);
     }
     close(sock_raw);
     printf ( "Finished" );
     return  0;
}
 
void  ProcessPacket(unsigned  char * buffer,  int  size)
{
     //Get the IP Header part of this packet , excluding the ethernet header
     struct  iphdr *iph = ( struct  iphdr*)(buffer +  sizeof ( struct  ethhdr));
     ++total;
     switch  (iph->protocol)  //Check the Protocol and do accordingly...
     {
         case  1:   //ICMP Protocol
             ++icmp;
             print_icmp_packet( buffer , size);
             break ;
         
         case  2:   //IGMP Protocol
             ++igmp;
             break ;
         
         case  6:   //TCP Protocol
             ++tcp;
             print_tcp_packet(buffer , size);
             break ;
         
         case  17:  //UDP Protocol
             ++udp;
             print_udp_packet(buffer , size);
             break ;
         
         default //Some Other Protocol like ARP etc.
             ++others;
             break ;
     }
     printf ( "TCP : %d   UDP : %d   ICMP : %d   IGMP : %d   Others : %d   Total : %d\r" , tcp , udp , icmp , igmp , others , total);
}
 
void  print_ethernet_header(unsigned  char * Buffer,  int  Size)
{
     struct  ethhdr *eth = ( struct  ethhdr *)Buffer;
     
     fprintf (logfile ,  "\n" );
     fprintf (logfile ,  "Ethernet Header\n" );
     fprintf (logfile ,  "   |-Destination Address : %.2X-%.2X-%.2X-%.2X-%.2X-%.2X \n" , eth->h_dest[0] , eth->h_dest[1] , eth->h_dest[2] , eth->h_dest[3] , eth->h_dest[4] , eth->h_dest[5] );
     fprintf (logfile ,  "   |-Source Address      : %.2X-%.2X-%.2X-%.2X-%.2X-%.2X \n" , eth->h_source[0] , eth->h_source[1] , eth->h_source[2] , eth->h_source[3] , eth->h_source[4] , eth->h_source[5] );
     fprintf (logfile ,  "   |-Protocol            : %u \n" ,(unsigned  short )eth->h_proto);
}
 
void  print_ip_header(unsigned  char * Buffer,  int  Size)
{
     print_ethernet_header(Buffer , Size);
   
     unsigned  short  iphdrlen;
         
     struct  iphdr *iph = ( struct  iphdr *)(Buffer  +  sizeof ( struct  ethhdr) );
     iphdrlen =iph->ihl*4;
     
     memset (&source, 0,  sizeof (source));
     source.sin_addr.s_addr = iph->saddr;
     
     memset (&dest, 0,  sizeof (dest));
     dest.sin_addr.s_addr = iph->daddr;
     
     fprintf (logfile ,  "\n" );
     fprintf (logfile ,  "IP Header\n" );
     fprintf (logfile ,  "   |-IP Version        : %d\n" ,(unsigned  int )iph->version);
     fprintf (logfile ,  "   |-IP Header Length  : %d DWORDS or %d Bytes\n" ,(unsigned  int )iph->ihl,((unsigned  int )(iph->ihl))*4);
     fprintf (logfile ,  "   |-Type Of Service   : %d\n" ,(unsigned  int )iph->tos);
     fprintf (logfile ,  "   |-IP Total Length   : %d  Bytes(Size of Packet)\n" ,ntohs(iph->tot_len));
     fprintf (logfile ,  "   |-Identification    : %d\n" ,ntohs(iph->id));
     //fprintf(logfile , "   |-Reserved ZERO Field   : %d\n",(unsigned int)iphdr->ip_reserved_zero);
     //fprintf(logfile , "   |-Dont Fragment Field   : %d\n",(unsigned int)iphdr->ip_dont_fragment);
     //fprintf(logfile , "   |-More Fragment Field   : %d\n",(unsigned int)iphdr->ip_more_fragment);
     fprintf (logfile ,  "   |-TTL      : %d\n" ,(unsigned  int )iph->ttl);
     fprintf (logfile ,  "   |-Protocol : %d\n" ,(unsigned  int )iph->protocol);
     fprintf (logfile ,  "   |-Checksum : %d\n" ,ntohs(iph->check));
     fprintf (logfile ,  "   |-Source IP        : %s\n" ,inet_ntoa(source.sin_addr));
     fprintf (logfile ,  "   |-Destination IP   : %s\n" ,inet_ntoa(dest.sin_addr));
}
 
void  print_tcp_packet(unsigned  char * Buffer,  int  Size)
{
     unsigned  short  iphdrlen;
     
     struct  iphdr *iph = ( struct  iphdr *)( Buffer  +  sizeof ( struct  ethhdr) );
     iphdrlen = iph->ihl*4;
     
     struct  tcphdr *tcph=( struct  tcphdr*)(Buffer + iphdrlen +  sizeof ( struct  ethhdr));
             
     int  header_size =   sizeof ( struct  ethhdr) + iphdrlen + tcph->doff*4;
     
     fprintf (logfile ,  "\n\n***********************TCP Packet*************************\n" ); 
         
     print_ip_header(Buffer,Size);
         
     fprintf (logfile ,  "\n" );
     fprintf (logfile ,  "TCP Header\n" );
     fprintf (logfile ,  "   |-Source Port      : %u\n" ,ntohs(tcph->source));
     fprintf (logfile ,  "   |-Destination Port : %u\n" ,ntohs(tcph->dest));
     fprintf (logfile ,  "   |-Sequence Number    : %u\n" ,ntohl(tcph->seq));
     fprintf (logfile ,  "   |-Acknowledge Number : %u\n" ,ntohl(tcph->ack_seq));
     fprintf (logfile ,  "   |-Header Length      : %d DWORDS or %d BYTES\n"  ,(unsigned  int )tcph->doff,(unsigned  int )tcph->doff*4);
     //fprintf(logfile , "   |-CWR Flag : %d\n",(unsigned int)tcph->cwr);
     //fprintf(logfile , "   |-ECN Flag : %d\n",(unsigned int)tcph->ece);
     fprintf (logfile ,  "   |-Urgent Flag          : %d\n" ,(unsigned  int )tcph->urg);
     fprintf (logfile ,  "   |-Acknowledgement Flag : %d\n" ,(unsigned  int )tcph->ack);
     fprintf (logfile ,  "   |-Push Flag            : %d\n" ,(unsigned  int )tcph->psh);
     fprintf (logfile ,  "   |-Reset Flag           : %d\n" ,(unsigned  int )tcph->rst);
     fprintf (logfile ,  "   |-Synchronise Flag     : %d\n" ,(unsigned  int )tcph->syn);
     fprintf (logfile ,  "   |-Finish Flag          : %d\n" ,(unsigned  int )tcph->fin);
     fprintf (logfile ,  "   |-Window         : %d\n" ,ntohs(tcph->window));
     fprintf (logfile ,  "   |-Checksum       : %d\n" ,ntohs(tcph->check));
     fprintf (logfile ,  "   |-Urgent Pointer : %d\n" ,tcph->urg_ptr);
     fprintf (logfile ,  "\n" );
     fprintf (logfile ,  "                        DATA Dump                         " );
     fprintf (logfile ,  "\n" );
         
     fprintf (logfile ,  "IP Header\n" );
     PrintData(Buffer,iphdrlen);
         
     fprintf (logfile ,  "TCP Header\n" );
     PrintData(Buffer+iphdrlen,tcph->doff*4);
         
     fprintf (logfile ,  "Data Payload\n" );   
     PrintData(Buffer + header_size , Size - header_size );
                         
     fprintf (logfile ,  "\n###########################################################" );
}
 
void  print_udp_packet(unsigned  char  *Buffer ,  int  Size)
{
     
     unsigned  short  iphdrlen;
     
     struct  iphdr *iph = ( struct  iphdr *)(Buffer +   sizeof ( struct  ethhdr));
     iphdrlen = iph->ihl*4;
     
     struct  udphdr *udph = ( struct  udphdr*)(Buffer + iphdrlen  +  sizeof ( struct  ethhdr));
     
     int  header_size =   sizeof ( struct  ethhdr) + iphdrlen +  sizeof  udph;
     
     fprintf (logfile ,  "\n\n***********************UDP Packet*************************\n" );
     
     print_ip_header(Buffer,Size);          
     
     fprintf (logfile ,  "\nUDP Header\n" );
     fprintf (logfile ,  "   |-Source Port      : %d\n"  , ntohs(udph->source));
     fprintf (logfile ,  "   |-Destination Port : %d\n"  , ntohs(udph->dest));
     fprintf (logfile ,  "   |-UDP Length       : %d\n"  , ntohs(udph->len));
     fprintf (logfile ,  "   |-UDP Checksum     : %d\n"  , ntohs(udph->check));
     
     fprintf (logfile ,  "\n" );
     fprintf (logfile ,  "IP Header\n" );
     PrintData(Buffer , iphdrlen);
         
     fprintf (logfile ,  "UDP Header\n" );
     PrintData(Buffer+iphdrlen ,  sizeof  udph);
         
     fprintf (logfile ,  "Data Payload\n" );   
     
     //Move the pointer ahead and reduce the size of string
     PrintData(Buffer + header_size , Size - header_size);
     
     fprintf (logfile ,  "\n###########################################################" );
}
 
void  print_icmp_packet(unsigned  char * Buffer ,  int  Size)
{
     unsigned  short  iphdrlen;
     
     struct  iphdr *iph = ( struct  iphdr *)(Buffer  +  sizeof ( struct  ethhdr));
     iphdrlen = iph->ihl * 4;
     
     struct  icmphdr *icmph = ( struct  icmphdr *)(Buffer + iphdrlen  +  sizeof ( struct  ethhdr));
     
     int  header_size =   sizeof ( struct  ethhdr) + iphdrlen +  sizeof  icmph;
     
     fprintf (logfile ,  "\n\n***********************ICMP Packet*************************\n" );
     
     print_ip_header(Buffer , Size);
             
     fprintf (logfile ,  "\n" );
         
     fprintf (logfile ,  "ICMP Header\n" );
     fprintf (logfile ,  "   |-Type : %d" ,(unsigned  int )(icmph->type));
             
     if ((unsigned  int )(icmph->type) == 11)
     {
         fprintf (logfile ,  "  (TTL Expired)\n" );
     }
     else  if ((unsigned  int )(icmph->type) == ICMP_ECHOREPLY)
     {
         fprintf (logfile ,  "  (ICMP Echo Reply)\n" );
     }
     
     fprintf (logfile ,  "   |-Code : %d\n" ,(unsigned  int )(icmph->code));
     fprintf (logfile ,  "   |-Checksum : %d\n" ,ntohs(icmph->checksum));
     //fprintf(logfile , "   |-ID       : %d\n",ntohs(icmph->id));
     //fprintf(logfile , "   |-Sequence : %d\n",ntohs(icmph->sequence));
     fprintf (logfile ,  "\n" );
 
     fprintf (logfile ,  "IP Header\n" );
     PrintData(Buffer,iphdrlen);
         
     fprintf (logfile ,  "UDP Header\n" );
     PrintData(Buffer + iphdrlen ,  sizeof  icmph);
         
     fprintf (logfile ,  "Data Payload\n" );   
     
     //Move the pointer ahead and reduce the size of string
     PrintData(Buffer + header_size , (Size - header_size) );
     
     fprintf (logfile ,  "\n###########################################################" );
}
 
void  PrintData (unsigned  char * data ,  int  Size)
{
     int  i , j;
     for (i=0 ; i < Size ; i++)
     {
         if ( i!=0 && i%16==0)    //if one line of hex printing is complete...
         {
             fprintf (logfile ,  "         " );
             for (j=i-16 ; j<i ; j++)
             {
                 if (data[j]>=32 && data[j]<=128)
                     fprintf (logfile ,  "%c" ,(unsigned  char )data[j]);  //if its a number or alphabet
                 
                 else  fprintf (logfile ,  "." );  //otherwise print a dot
             }
             fprintf (logfile ,  "\n" );
         }
         
         if (i%16==0)  fprintf (logfile ,  "   " );
             fprintf (logfile ,  " %02X" ,(unsigned  int )data[i]);
                 
         if ( i==Size-1)   //print the last spaces
         {
             for (j=0;j<15-i%16;j++)
             {
               fprintf (logfile ,  "   " );  //extra spaces
             }
             
             fprintf (logfile ,  "         " );
             
             for (j=i-i%16 ; j<=i ; j++)
             {
                 if (data[j]>=32 && data[j]<=128)
                 {
                   fprintf (logfile ,  "%c" ,(unsigned  char )data[j]);
                 }
                 else
                 {
                   fprintf (logfile ,  "." );
                 }
             }
             
             fprintf (logfile ,   "\n"  );
         }
     }
}

  The log file will looks somewhat like this :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
***********************TCP Packet*************************
 
Ethernet Header
    |-Destination Address : 00-25-5E-1A-3D-F1
    |-Source Address      : 00-1C-C0-F8-79-EE
    |-Protocol            : 8
 
IP Header
    |-IP Version        : 4
    |-IP Header Length  : 5 DWORDS or 20 Bytes
    |-Type Of Service   : 0
    |-IP Total Length   : 141  Bytes(Size of Packet)
    |-Identification    : 13122
    |-TTL      : 64
    |-Protocol : 6
    |-Checksum : 45952
    |-Source IP        : 192.168.1.6
    |-Destination IP   : 74.125.71.125
 
TCP Header
    |-Source Port      : 33655
    |-Destination Port : 5222
    |-Sequence Number    : 78458457
    |-Acknowledge Number : 2427066746
    |-Header Length      : 5 DWORDS or 20 BYTES
    |-Urgent Flag          : 0
    |-Acknowledgement Flag : 1
    |-Push Flag            : 1
    |-Reset Flag           : 0
    |-Synchronise Flag     : 0
    |-Finish Flag          : 0
    |-Window         : 62920
    |-Checksum       : 21544
    |-Urgent Pointer : 0
 
                         DATA Dump                        
IP Header
     00 25 5E 1A 3D F1 00 1C C0 F8 79 EE 08 00 45 00         .%^.=.....y...E.
     00 8D 33 42                                             ..3B
TCP Header
     40 00 40 06 B3 80 C0 A8 01 06 4A 7D 47 7D 83 77         @.@..?....J}G}.w
     14 66 04 AD                                             .f..
Data Payload
     17 03 01 00 60 A0 9C 5D 14 A1 25 AB CE 8B 7C EB         ....`..]..%...|.
     1A A4 43 A6 60 DD E8 6B 6E 43 C1 94 6A D2 25 23         ..C.`..knC..j.%#
     03 98 59 67 1A 2C 07 D3 7E B2 B8 9F 83 38 4C 69         ..Yg.,..~....8Li
     D3 3A 8E 0D 9E F0 6B CE 9E 6B F4 E1 BD 9E 50 53         .:....k..k....PS
     6D F6 AB 11 05 D6 41 82 F0 03 0C A6 E2 48 2B 71         m.....A......H+q
     16 81 FF 5B DF 50 D4 5B AD 90 04 5E 4C 94 E7 9B         ...[.P.[...^L...
     0B 72 7E 32 88                                          .r~2.
 
###########################################################
 
***********************TCP Packet*************************
 
Ethernet Header
    |-Destination Address : 00-1C-C0-F8-79-EE
    |-Source Address      : 00-25-5E-1A-3D-F1
    |-Protocol            : 8
 
IP Header
    |-IP Version        : 4
    |-IP Header Length  : 5 DWORDS or 20 Bytes
    |-Type Of Service   : 32
    |-IP Total Length   : 141  Bytes(Size of Packet)
    |-Identification    : 30410
    |-TTL      : 48
    |-Protocol : 6
    |-Checksum : 49112
    |-Source IP        : 74.125.71.125
    |-Destination IP   : 192.168.1.6
 
TCP Header
    |-Source Port      : 5222
    |-Destination Port : 33655
    |-Sequence Number    : 2427066746
    |-Acknowledge Number : 78458558
    |-Header Length      : 5 DWORDS or 20 BYTES
    |-Urgent Flag          : 0
    |-Acknowledgement Flag : 1
    |-Push Flag            : 1
    |-Reset Flag           : 0
    |-Synchronise Flag     : 0
    |-Finish Flag          : 0
    |-Window         : 63784
    |-Checksum       : 63942
    |-Urgent Pointer : 0
 
                         DATA Dump                        
IP Header
     00 1C C0 F8 79 EE 00 25 5E 1A 3D F1 08 00 45 20         ....y..%^.=...E
     00 8D 76 CA                                             ..v.
TCP Header
     00 00 30 06 BF D8 4A 7D 47 7D C0 A8 01 06 14 66         ..0...J}G}.....f
     83 77 90 AA                                             .w..
Data Payload
     17 03 01 00 60 01 B9 00 4E C7 79 0D 89 09 15 BF         ....`...N.y.....
     9C BB 53 8D 50 DB 97 4E 25 AC FA E2 55 20 94 8B         ..S.P..N%...U ..
     AF 6E 84 E2 95 8B D9 26 A3 63 7D E4 F0 CA 6F 72         .n.....&.c}...or
     F6 29 95 79 98 BC 12 BF F1 C5 34 42 83 A3 F8 B6         .).y......4B....
     9E B2 7B 1C FC F7 3E BA 4E B1 FB 36 89 93 E3 58         ..{...>.N..6...X
     A7 FC 5B C3 68 9E 35 CC 25 00 7D 82 3D DB 86 EA         ..[.h.5.%.}.=...
     66 89 99 B3 65                                          f...e
 
###########################################################

  

In the above log we can see the ethernet headers being printed. They show the source and destination mac address along with the packet protocol. 8 means IP protocol

Note :

1. If you want to sniff only IP and ARP packets for example then you can try this :
sock_raw = socket( AF_PACKET , SOCK_RAW , htons(ETH_P_IP|ETH_P_ARP)) ;

The complete list of protocols is found in /usr/include/linux/if_ether.h

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
/*
  *  These are the defined Ethernet Protocol ID's.
  */
 
#define ETH_P_LOOP  0x0060      /* Ethernet Loopback packet */
#define ETH_P_PUP   0x0200      /* Xerox PUP packet     */
#define ETH_P_PUPAT 0x0201      /* Xerox PUP Addr Trans packet  */
#define ETH_P_IP    0x0800      /* Internet Protocol packet */
#define ETH_P_X25   0x0805      /* CCITT X.25           */
#define ETH_P_ARP   0x0806      /* Address Resolution packet    */
#define ETH_P_BPQ   0x08FF      /* G8BPQ AX.25 Ethernet Packet  [ NOT AN OFFICIALLY REGISTERED ID ] */
#define ETH_P_IEEEPUP   0x0a00      /* Xerox IEEE802.3 PUP packet */
#define ETH_P_IEEEPUPAT 0x0a01      /* Xerox IEEE802.3 PUP Addr Trans packet */
#define ETH_P_DEC       0x6000          /* DEC Assigned proto           */
#define ETH_P_DNA_DL    0x6001          /* DEC DNA Dump/Load            */
#define ETH_P_DNA_RC    0x6002          /* DEC DNA Remote Console       */
#define ETH_P_DNA_RT    0x6003          /* DEC DNA Routing              */
#define ETH_P_LAT       0x6004          /* DEC LAT                      */
#define ETH_P_DIAG      0x6005          /* DEC Diagnostics              */
#define ETH_P_CUST      0x6006          /* DEC Customer use             */
#define ETH_P_SCA       0x6007          /* DEC Systems Comms Arch       */
#define ETH_P_TEB   0x6558      /* Trans Ether Bridging     */
#define ETH_P_RARP      0x8035      /* Reverse Addr Res packet  */
#define ETH_P_ATALK 0x809B      /* Appletalk DDP        */
#define ETH_P_AARP  0x80F3      /* Appletalk AARP       */
#define ETH_P_8021Q 0x8100          /* 802.1Q VLAN Extended Header  */
#define ETH_P_IPX   0x8137      /* IPX over DIX         */
#define ETH_P_IPV6  0x86DD      /* IPv6 over bluebook       */
#define ETH_P_PAUSE 0x8808      /* IEEE Pause frames. See 802.3 31B */
#define ETH_P_SLOW  0x8809      /* Slow Protocol. See 802.3ad 43B */
#define ETH_P_WCCP  0x883E      /* Web-cache coordination protocol
                      * defined in draft-wilson-wrec-wccp-v2-00.txt */
#define ETH_P_PPP_DISC  0x8863      /* PPPoE discovery messages     */
#define ETH_P_PPP_SES   0x8864      /* PPPoE session messages   */
#define ETH_P_MPLS_UC   0x8847      /* MPLS Unicast traffic     */
#define ETH_P_MPLS_MC   0x8848      /* MPLS Multicast traffic   */
#define ETH_P_ATMMPOA   0x884c      /* MultiProtocol Over ATM   */
#define ETH_P_LINK_CTL  0x886c      /* HPNA, wlan link local tunnel */
#define ETH_P_ATMFATE   0x8884      /* Frame-based ATM Transport
                      * over Ethernet
                      */
#define ETH_P_PAE   0x888E      /* Port Access Entity (IEEE 802.1X) */
#define ETH_P_AOE   0x88A2      /* ATA over Ethernet        */
#define ETH_P_TIPC  0x88CA      /* TIPC             */
#define ETH_P_1588  0x88F7      /* IEEE 1588 Timesync */
#define ETH_P_FCOE  0x8906      /* Fibre Channel over Ethernet  */
#define ETH_P_FIP   0x8914      /* FCoE Initialization Protocol */
#define ETH_P_EDSA  0xDADA      /* Ethertype DSA [ NOT AN OFFICIALLY REGISTERED ID ] */
 
/*
  *  Non DIX types. Won't clash for 1500 types.
  */
 
#define ETH_P_802_3 0x0001      /* Dummy type for 802.3 frames  */
#define ETH_P_AX25  0x0002      /* Dummy protocol id for AX.25  */
#define ETH_P_ALL   0x0003      /* Every packet (be careful!!!) */
#define ETH_P_802_2 0x0004      /* 802.2 frames         */
#define ETH_P_SNAP  0x0005      /* Internal only        */
#define ETH_P_DDCMP     0x0006          /* DEC DDCMP: Internal only     */
#define ETH_P_WAN_PPP   0x0007          /* Dummy type for WAN PPP frames*/
#define ETH_P_PPP_MP    0x0008          /* Dummy type for PPP MP frames */
#define ETH_P_LOCALTALK 0x0009      /* Localtalk pseudo type    */
#define ETH_P_CAN   0x000C      /* Controller Area Network      */
#define ETH_P_PPPTALK   0x0010      /* Dummy type for Atalk over PPP*/
#define ETH_P_TR_802_2  0x0011      /* 802.2 frames         */
#define ETH_P_MOBITEX   0x0015      /* Mobitex (kaz@cafe.net)   */
#define ETH_P_CONTROL   0x0016      /* Card specific control frames */
#define ETH_P_IRDA  0x0017      /* Linux-IrDA           */
#define ETH_P_ECONET    0x0018      /* Acorn Econet         */
#define ETH_P_HDLC  0x0019      /* HDLC frames          */
#define ETH_P_ARCNET    0x001A      /* 1A for ArcNet :-)            */
#define ETH_P_DSA   0x001B      /* Distributed Switch Arch. */
#define ETH_P_TRAILER   0x001C      /* Trailer switch tagging   */
#define ETH_P_PHONET    0x00F5      /* Nokia Phonet frames          */
#define ETH_P_IEEE802154 0x00F6     /* IEEE802.15.4 frame       */
#define ETH_P_CAIF  0x00F7      /* ST-Ericsson CAIF protocol    */

  Enjoy!!


==============================================================================
本文转自被遗忘的博客园博客,原文链接:http://www.cnblogs.com/rollenholt/articles/2585579.html,如需转载请自行联系原作者

相关文章
|
机器学习/深度学习 网络协议 Unix
|
4天前
|
机器学习/深度学习 缓存 监控
linux查看CPU、内存、网络、磁盘IO命令
`Linux`系统中,使用`top`命令查看CPU状态,要查看CPU详细信息,可利用`cat /proc/cpuinfo`相关命令。`free`命令用于查看内存使用情况。网络相关命令包括`ifconfig`(查看网卡状态)、`ifdown/ifup`(禁用/启用网卡)、`netstat`(列出网络连接,如`-tuln`组合)以及`nslookup`、`ping`、`telnet`、`traceroute`等。磁盘IO方面,`iostat`(如`-k -p ALL`)显示磁盘IO统计,`iotop`(如`-o -d 1`)则用于查看磁盘IO瓶颈。
|
13天前
|
NoSQL Linux Shell
常用的 Linux 命令
常用的 Linux 命令
36 9
|
1天前
|
Ubuntu Linux Shell
linux免交互登陆远程主机并执行命令(密钥对和Expect)
linux免交互登陆远程主机并执行命令(密钥对和Expect)
|
1天前
|
Linux
【Linux】常用命令
【Linux】常用命令
21 0
|
1天前
|
安全 Ubuntu Linux
Linux 网络操作命令Telnet
Linux 网络操作命令Telnet
13 0
Linux 网络操作命令Telnet