tor-commits
Threads by month
- ----- 2025 -----
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
May 2016
- 17 participants
- 1550 discussions
commit 29f56af6ba8cfbc6c8d8d4f5729f8c30bf384111
Author: Joe Landers <joe(a)joelanders.net>
Date: Tue Apr 5 13:22:44 2016 +0200
formatting and filename fixes
---
test-specs/ts-001-bridget.md | 2 +-
test-specs/ts-005-dns-spoof.md | 131 ++++++++---------
test-specs/ts-012-lantern.md | 111 ---------------
test-specs/ts-013-lantern.md | 111 +++++++++++++++
test-specs/ts-013-meek-fronted-requests.md | 111 ---------------
test-specs/ts-014-meek-fronted-requests.md | 111 +++++++++++++++
test-specs/ts-014-psiphon.md | 146 -------------------
test-specs/ts-015-openvpn.md | 218 ----------------------------
test-specs/ts-015-psiphon.md | 148 +++++++++++++++++++
test-specs/ts-016-openvpn.md | 220 +++++++++++++++++++++++++++++
10 files changed, 657 insertions(+), 652 deletions(-)
diff --git a/test-specs/ts-001-bridget.md b/test-specs/ts-001-bridget.md
index f800df5..e2b9f47 100644
--- a/test-specs/ts-001-bridget.md
+++ b/test-specs/ts-001-bridget.md
@@ -55,7 +55,7 @@ Note: This test is deprecated
# Privacy considerations
- * Bridge location should not be devolved to adversaries.
+ * Bridge location should not be revealed to adversaries.
* If possible, the fact that a scan is running should be difficult to detect.
# Packet capture considerations
diff --git a/test-specs/ts-005-dns-spoof.md b/test-specs/ts-005-dns-spoof.md
index 417dc8b..94f0f3a 100644
--- a/test-specs/ts-005-dns-spoof.md
+++ b/test-specs/ts-005-dns-spoof.md
@@ -77,72 +77,73 @@ Whether or not DNS spoofing is occurring for a particular FQDN.
## Example output sample
-
- ###########################################
- # OONI Probe Report for dns_spoof (0.0.1)
- # Wed Sep 25 15:39:32 2013
- ###########################################
- ---
- input_hashes: []
- options: [-r, '10.211.0.10:53', -h, google.com]
- probe_asn: AS2819
- probe_cc: CZ
- probe_ip: 127.0.0.1
- software_name: ooniprobe
- software_version: 1.0.0-rc3
- start_time: 1380116372.573729
- test_name: dns_spoof
- test_version: 0.0.1
- ...
- ---
- answer_flags: [ipsrc]
+```
+###########################################
+# OONI Probe Report for dns_spoof (0.0.1)
+# Wed Sep 25 15:39:32 2013
+###########################################
+---
+input_hashes: []
+options: [-r, '10.211.0.10:53', -h, google.com]
+probe_asn: AS2819
+probe_cc: CZ
+probe_ip: 127.0.0.1
+software_name: ooniprobe
+software_version: 1.0.0-rc3
+start_time: 1380116372.573729
+test_name: dns_spoof
+test_version: 0.0.1
+...
+---
+answer_flags: [ipsrc]
+answered_packets:
+- - raw_packet: !!binary |
+ RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
+ ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
+ AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
+ AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
+ summary: 'IP / UDP / DNS Ans "173.194.44.229" '
+- - raw_packet: !!binary |
+ RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
+ ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
+ AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
+ AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
+ summary: 'IP / UDP / DNS Ans "173.194.44.231" '
+input: null
+sent_packets:
+- - raw_packet: !!binary |
+ RQAAOAABAABAEeujfwAAAQgICAgANQA1ACRccgAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
+ summary: 'IP / UDP / DNS Qry "google.com" '
+- - raw_packet: !!binary |
+ RQAAOAABAABAEfDWfwAAAQrTAAoANQA1ACRhpQAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
+ summary: 'IP / UDP / DNS Qry "google.com" '
+spoofing: false
+test_a_lookup:
+ answered_packets:
+ - raw_packet: !!binary |
+ RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
+ ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
+ AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
+ AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
+ summary: 'IP / UDP / DNS Ans "173.194.44.231" '
+test_control_a_lookup:
answered_packets:
- - - raw_packet: !!binary |
- RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
- ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
- AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
- AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
- summary: 'IP / UDP / DNS Ans "173.194.44.229" '
- - - raw_packet: !!binary |
- RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
- ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
- AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
- AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
- summary: 'IP / UDP / DNS Ans "173.194.44.231" '
- input: null
- sent_packets:
- - - raw_packet: !!binary |
- RQAAOAABAABAEeujfwAAAQgICAgANQA1ACRccgAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
- summary: 'IP / UDP / DNS Qry "google.com" '
- - - raw_packet: !!binary |
- RQAAOAABAABAEfDWfwAAAQrTAAoANQA1ACRhpQAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
- summary: 'IP / UDP / DNS Qry "google.com" '
- spoofing: false
- test_a_lookup:
- answered_packets:
- - raw_packet: !!binary |
- RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
- ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
- AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
- AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
- summary: 'IP / UDP / DNS Ans "173.194.44.231" '
- test_control_a_lookup:
- answered_packets:
- - raw_packet: !!binary |
- RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
- ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
- AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
- AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
- summary: 'IP / UDP / DNS Ans "173.194.44.229" '
- ...
+ - raw_packet: !!binary |
+ RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
+ ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
+ AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
+ AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
+ summary: 'IP / UDP / DNS Ans "173.194.44.229" '
+...
+```
# Privacy considerations
diff --git a/test-specs/ts-012-lantern.md b/test-specs/ts-012-lantern.md
deleted file mode 100644
index 508bdfc..0000000
--- a/test-specs/ts-012-lantern.md
+++ /dev/null
@@ -1,111 +0,0 @@
-# Specification version number
-
-2015-04-03-000
-
-# Specification name
-
-Lantern Test
-
-# Test preconditions
-
-Downloaded or compiled the "lantern" binary and made executable and in
-the users PATH environment variable.
-
-# Expected impact
-
-Ability to measure whether Lantern is working from the given network vantage point.
-
-# Expected inputs
-
-A single URL to fetch, supplied by command line argument "--url (-u)". To test
-Lantern, it must be a URL from the whitelisted set.
-See: https://github.com/getlantern/flashlight/blob/master/genconfig/proxiedsites/
-
-# Test description
-
-This test launches Lantern in --headless mode, and parses output to determine
-if it has bootstrapped. After bootstrap, it fetches the URL supplied by the
---url option using Lanterns http proxy interface listening on 127.0.0.1.8787.
-
-The specific string used to determine bootstrap from Lantern output in version
-"2.0.10" is "Connected to proxy on localhost" from standard output.
-
-# Expected output
-
-## Parent data format
-
-None.
-
-## Required output data
-
-success:
-**boolean** The bootstrap status of Lantern (success or failure).
-
-lantern --headless:
-**dictionary** the parent key of Lanterns output that contains the keys stdout and stderr
-
-stdout:
-**string** Output produced by Lanterns standard output.
-
-stderr:
-**string** Error produced by Lanterns standard error.
-
-body:
-**string** The page body of a successful HTTP request.
-
-failure:
-**string** If failure, then the corresponding failure message.
-
-
-## Data specification version number
-
-## Semantics
-
-'success' - True or False - whether Lantern has bootstrapped.
-'body' - http page body if successfully requested.
-'failure' - optional, present if there is a failure.
-'lantern --headless':
- 'stdout' - Contents of standard output produced by Lantern.
- 'stderr' - Contents of standard error produced by Lantern.
-
-
-## Possible conclusions
-
-We can determine whether or not Lantern is able to bootstrap, according to its output.
-We can determine whether or not a given URL is reachable via Lantern.
-
-## Example output sample
-```
----
-input_hashes: []
-options: [-u, google.com]
-probe_asn: AS1234
-probe_cc: US
-probe_city: null
-probe_ip: 127.0.0.1
-software_name: ooniprobe
-software_version: 1.2.3-rc1
-start_time: 1428344311.0
-test_name: lantern_circumvention_tool_test
-test_version: 0.0.1
-...
----
-body: "<HTML><HEAD><meta http-equiv=\"content-type\" content=\"text/html;charset=utf-8\"\
- >\n<TITLE>301 Moved</TITLE></HEAD><BODY>\n<H1>301 Moved</H1>\nThe document has moved\n\
- <A HREF=\"http://www.google.com/\">here</A>.\r\n</BODY></HTML>\r\n"
-bootstrapped: true
-input: null
-lantern --headless: {exit_reason: process_done, stderr: '', stdout: ''}
-```
-
-## Expected Post-processing efforts
-
-# Privacy considerations
-
-Lantern does not seek to provide anonymity. Lantern contains tracking analytics
-software and may connect directly to Lantern-provided proxy endpoints, or use
-fronted domains via Content Delivery Networks (CDNs) as a data channel.
-
-# Packet capture considerations
-
-This test does not capture packets by default.
diff --git a/test-specs/ts-013-lantern.md b/test-specs/ts-013-lantern.md
new file mode 100644
index 0000000..508bdfc
--- /dev/null
+++ b/test-specs/ts-013-lantern.md
@@ -0,0 +1,111 @@
+# Specification version number
+
+2015-04-03-000
+
+# Specification name
+
+Lantern Test
+
+# Test preconditions
+
+Downloaded or compiled the "lantern" binary and made executable and in
+the users PATH environment variable.
+
+# Expected impact
+
+Ability to measure whether Lantern is working from the given network vantage point.
+
+# Expected inputs
+
+A single URL to fetch, supplied by command line argument "--url (-u)". To test
+Lantern, it must be a URL from the whitelisted set.
+See: https://github.com/getlantern/flashlight/blob/master/genconfig/proxiedsites/
+
+# Test description
+
+This test launches Lantern in --headless mode, and parses output to determine
+if it has bootstrapped. After bootstrap, it fetches the URL supplied by the
+--url option using Lanterns http proxy interface listening on 127.0.0.1.8787.
+
+The specific string used to determine bootstrap from Lantern output in version
+"2.0.10" is "Connected to proxy on localhost" from standard output.
+
+# Expected output
+
+## Parent data format
+
+None.
+
+## Required output data
+
+success:
+**boolean** The bootstrap status of Lantern (success or failure).
+
+lantern --headless:
+**dictionary** the parent key of Lanterns output that contains the keys stdout and stderr
+
+stdout:
+**string** Output produced by Lanterns standard output.
+
+stderr:
+**string** Error produced by Lanterns standard error.
+
+body:
+**string** The page body of a successful HTTP request.
+
+failure:
+**string** If failure, then the corresponding failure message.
+
+
+## Data specification version number
+
+## Semantics
+
+'success' - True or False - whether Lantern has bootstrapped.
+'body' - http page body if successfully requested.
+'failure' - optional, present if there is a failure.
+'lantern --headless':
+ 'stdout' - Contents of standard output produced by Lantern.
+ 'stderr' - Contents of standard error produced by Lantern.
+
+
+## Possible conclusions
+
+We can determine whether or not Lantern is able to bootstrap, according to its output.
+We can determine whether or not a given URL is reachable via Lantern.
+
+## Example output sample
+```
+---
+input_hashes: []
+options: [-u, google.com]
+probe_asn: AS1234
+probe_cc: US
+probe_city: null
+probe_ip: 127.0.0.1
+software_name: ooniprobe
+software_version: 1.2.3-rc1
+start_time: 1428344311.0
+test_name: lantern_circumvention_tool_test
+test_version: 0.0.1
+...
+---
+body: "<HTML><HEAD><meta http-equiv=\"content-type\" content=\"text/html;charset=utf-8\"\
+ >\n<TITLE>301 Moved</TITLE></HEAD><BODY>\n<H1>301 Moved</H1>\nThe document has moved\n\
+ <A HREF=\"http://www.google.com/\">here</A>.\r\n</BODY></HTML>\r\n"
+bootstrapped: true
+input: null
+lantern --headless: {exit_reason: process_done, stderr: '', stdout: ''}
+```
+
+## Expected Post-processing efforts
+
+# Privacy considerations
+
+Lantern does not seek to provide anonymity. Lantern contains tracking analytics
+software and may connect directly to Lantern-provided proxy endpoints, or use
+fronted domains via Content Delivery Networks (CDNs) as a data channel.
+
+# Packet capture considerations
+
+This test does not capture packets by default.
diff --git a/test-specs/ts-013-meek-fronted-requests.md b/test-specs/ts-013-meek-fronted-requests.md
deleted file mode 100644
index f78066e..0000000
--- a/test-specs/ts-013-meek-fronted-requests.md
+++ /dev/null
@@ -1,111 +0,0 @@
-# Specification version number
-
-2015-04-01-000
-
-# Specification name
-
-Meek Fronted Request Test
-
-# Test preconditions
-
-* An internet connection
-
-# Expected impact
-
-Ability to detect uncensored fronted domains that can transmit requests to the
-"inside" meek-server via an intermediary web service.
-
-# Expected inputs
-
-## Import document or import data format
-
-A list of domain names (fronted domains) and host headers (meek-server) of the
-intermediary web service.
-
-## Semantics
-
-The input document may contain a domain name and a host header combination per
-line separated by colon in the format:
-
- DomainName:HostHeader
-
-Example:
-
- www.google.com:meek-reflect.appspot.com
- a0.awsstatic.com:d2zfqthxsdq309.cloudfront.net
-
-# Test description
-
-Performs a HTTP GET request over TLS (HTTPS) to a list of fronted domains with
-the Host Header of the "inside" meek-server. For diagnostic purposes the
-meek-server handles a GET request and respond with: "I’m just a happy little
-web server.\n". The GET request is sent over TLS to the root of the fronted
-domain with the Host Header option of the desired meek-server host.
-
-
-# Expected output
-
-## Parent data format
-
-df-001-httpt-000
-
-## Required output data
-
-* The domain name and host header used in the measurement
- (DomainName:HostHeader)
-
-* The requests that have been made
-
-* The received responses
-
-* If the meek server is blocked or unreachable
-
-## Semantics
-
-success:
- **boolean** indicates if an HTTPS GET response to the meek server is
- successfull
-
-## Possible conclusions
-
-If the fronted request/response to the meek server is successful.
-
-## Example output sample
-
-```
-agent: agent
-input: ajax.aspnetcdn.com:az668014.vo.msecnd.net
-requests:
-- request:
- body: null
- headers:
- - - Host
- - [az668014.vo.msecnd.net]
- method: GET
- tor: {is_tor: false}
- url: https://ajax.aspnetcdn.com
- response:
- body: "I\u2019m just a happy little web server.\n"
- code: 200
- headers:
- - - Content-Length
- - ['38']
- - - X-Cache
- - [HIT]
- - - X-Powered-By
- - [ASP.NET]
- - - Accept-Ranges
- - [bytes]
- - - Server
- - [ECAcc (fcn/40C4)]
- - - Last-Modified
- - ['Wed, 01 Apr 2015 09:25:13 GMT']
- - - Connection
- - [close]
- - - Date
- - ['Wed, 01 Apr 2015 10:01:37 GMT']
- - - Content-Type
- - [text/plain; charset=utf-8]
-socksproxy: null
-success: true
-```
diff --git a/test-specs/ts-014-meek-fronted-requests.md b/test-specs/ts-014-meek-fronted-requests.md
new file mode 100644
index 0000000..f78066e
--- /dev/null
+++ b/test-specs/ts-014-meek-fronted-requests.md
@@ -0,0 +1,111 @@
+# Specification version number
+
+2015-04-01-000
+
+# Specification name
+
+Meek Fronted Request Test
+
+# Test preconditions
+
+* An internet connection
+
+# Expected impact
+
+Ability to detect uncensored fronted domains that can transmit requests to the
+"inside" meek-server via an intermediary web service.
+
+# Expected inputs
+
+## Import document or import data format
+
+A list of domain names (fronted domains) and host headers (meek-server) of the
+intermediary web service.
+
+## Semantics
+
+The input document may contain a domain name and a host header combination per
+line separated by colon in the format:
+
+ DomainName:HostHeader
+
+Example:
+
+ www.google.com:meek-reflect.appspot.com
+ a0.awsstatic.com:d2zfqthxsdq309.cloudfront.net
+
+# Test description
+
+Performs a HTTP GET request over TLS (HTTPS) to a list of fronted domains with
+the Host Header of the "inside" meek-server. For diagnostic purposes the
+meek-server handles a GET request and respond with: "I’m just a happy little
+web server.\n". The GET request is sent over TLS to the root of the fronted
+domain with the Host Header option of the desired meek-server host.
+
+
+# Expected output
+
+## Parent data format
+
+df-001-httpt-000
+
+## Required output data
+
+* The domain name and host header used in the measurement
+ (DomainName:HostHeader)
+
+* The requests that have been made
+
+* The received responses
+
+* If the meek server is blocked or unreachable
+
+## Semantics
+
+success:
+ **boolean** indicates if an HTTPS GET response to the meek server is
+ successfull
+
+## Possible conclusions
+
+If the fronted request/response to the meek server is successful.
+
+## Example output sample
+
+```
+agent: agent
+input: ajax.aspnetcdn.com:az668014.vo.msecnd.net
+requests:
+- request:
+ body: null
+ headers:
+ - - Host
+ - [az668014.vo.msecnd.net]
+ method: GET
+ tor: {is_tor: false}
+ url: https://ajax.aspnetcdn.com
+ response:
+ body: "I\u2019m just a happy little web server.\n"
+ code: 200
+ headers:
+ - - Content-Length
+ - ['38']
+ - - X-Cache
+ - [HIT]
+ - - X-Powered-By
+ - [ASP.NET]
+ - - Accept-Ranges
+ - [bytes]
+ - - Server
+ - [ECAcc (fcn/40C4)]
+ - - Last-Modified
+ - ['Wed, 01 Apr 2015 09:25:13 GMT']
+ - - Connection
+ - [close]
+ - - Date
+ - ['Wed, 01 Apr 2015 10:01:37 GMT']
+ - - Content-Type
+ - [text/plain; charset=utf-8]
+socksproxy: null
+success: true
+```
diff --git a/test-specs/ts-014-psiphon.md b/test-specs/ts-014-psiphon.md
deleted file mode 100644
index 7bc6c04..0000000
--- a/test-specs/ts-014-psiphon.md
+++ /dev/null
@@ -1,146 +0,0 @@
-# Specification version number
-
-2015-10-11-000
-
-# Specification name
-
-Psiphon Test
-
-# Test preconditions
-
-Have psiphon-circumvention-system (including psiphon-circumvention-system/pyclient/psi_client.py) cloned in the home of the user that runs ooni or somewhere else accessible to the user that runs ooni.
-
-# Expected impact
-
-Ability to measure whether Psiphon is working from the given network vantage point.
-
-# Expected inputs
-
-Optionally:
-A single URL to fetch, supplied by command line argument "--url (-u)".
-Psiphon path, specified by the command line argument "--psiphonpath (-p)"
-The ip:port that Psiphon will use for the SOCKS proxy, with the command line argument "--socksproxy (-s)"
-
-# Test description
-
-This test first check that the Psiphon path exists, then launches Psiphon and parses output to determine if it has bootstrapped. After bootstrap, it fetches google.com (or other URL specified by the --url argument) using Psiphons SOCKS proxy listening on 127.0.0.1:1080 (or otherwise specified by the --socksproxy argument).
-
-The specific string used to determine bootstrap from Psiphon output in version
-"0.0.1" is "Press Ctrl-C to terminate." from standard output.
-
-# Expected output
-
-## Parent data format
-
-The following keys from df-001-httpt.md are used when Psiphon bootstraps: requests, socksproxy, agent.
-When Psiphon is not installed or does not bootstrap, only agent and socksproxy are used.
-
-## Required output data
-
-psiphon_installed:
-**boolean** Whether Psiphon client is found or not (success or failure).
-
-success:
-**boolean** The bootstrap status of Psiphon (success or failure).
-
-/tmp/<temporary file>:
-**dictionary** the parent key of Psiphon's output that contains the keys stdout and stderr and exit_reason
-
-stdout:
-**string** Output produced by Psiphon's standard output.
-
-stderr:
-**string** Error produced by Psiphon's standard error.
-
-## Data specification version number
-
-## Semantics
-
-'psiphon_installed' - True or False - whether Psiphon is found.
-'success' - True or False - whether Psiphon has bootstrapped.
-'body' - http page body if successfully requested.
-'/tmp/<temporary file>':
- 'stdout' - Contents of standard output produced by Psiphon.
- 'stderr' - Contents of standard error produced by Psiphon.
-
-
-## Possible conclusions
-
-We can determine whether or not Psiphon is found.
-We can determine whether or not Psiphon is able to bootstrap, according to its output.
-We can determine whether or not a given URL is reachable via Psiphon.
-
-## Example output sample
-```
----
-input_hashes: []
-options: [-u, google.com]
-probe_asn: AS0
-probe_cc: ZZ
-probe_city: null
-probe_ip: 127.0.0.1
-report_id: 4dAHr0ceNDBmw5lUQ7pBoxqgyUSfP873Qj1zv5VyElnSSTXwcsLYeCv69DsUjb94
-software_name: ooniprobe
-software_version: 1.3.1
-start_time: 1444686051.0
-test_helpers: {}
-test_name: psiphon_test
-test_version: 0.0.1
-...
----
-/tmp/tmplKg8K3: {exit_reason: process_done, stderr: '', stdout: "./ssh is not a valid\
- \ executable. Using standard ssh.\r\n\r\nYour SOCKS proxy is now running at 127.0.0.1:1080\r\
- \n\r\nPress Ctrl-C to terminate.\r\nTerminating...\r\nConnection closed\r\n"}
-agent: agent
-input: null
-psiphon_installed: true
-requests:
-- request:
- body: null
- headers: []
- method: GET
- tor: {is_tor: false}
- url: http://google.com
- response:
- body: "<HTML><HEAD><meta http-equiv=\"content-type\" content=\"text/html;charset=utf-8\"\
- >\n<TITLE>301 Moved</TITLE></HEAD><BODY>\n<H1>301 Moved</H1>\nThe document has\
- \ moved\n<A HREF=\"http://www.google.com/\">here</A>.\r\n</BODY></HTML>\r\n"
- code: 301
- headers:
- - - Content-Length
- - ['219']
- - - X-XSS-Protection
- - [1; mode=block]
- - - Expires
- - ['Wed, 11 Nov 2015 21:40:58 UTC']
- - - Server
- - [gws]
- - - Connection
- - [close]
- - - Location
- - ['http://www.google.com/']
- - - Cache-Control
- - ['public, max-age=2592000']
- - - Date
- - ['Mon, 12 Oct 2015 21:40:58 UTC']
- - - X-Frame-Options
- - [SAMEORIGIN]
- - - Content-Type
- - [text/html; charset=UTF-8]
-socksproxy: 127.0.0.1:1080
-test_runtime: 7.373162031173706
-test_start_time: 1444686052.0
-...
-```
-
-## Expected Post-processing efforts
-
-# Privacy considerations
-
-Psiphon does not seek to provide anonymity.
-An adversary can observe that a user is connecting to Psiphon servers.
-Psiphon servers can also determine the users location.
-
-# Packet capture considerations
-
-This test does not capture packets by default.
diff --git a/test-specs/ts-015-openvpn.md b/test-specs/ts-015-openvpn.md
deleted file mode 100644
index 84ed367..0000000
--- a/test-specs/ts-015-openvpn.md
+++ /dev/null
@@ -1,218 +0,0 @@
-# Specification version number
-
-2015-10-11-000
-
-# Specification name
-
-OpenVPN Test
-
-# Test preconditions
-
-Have OpenVPN installed and configured to work with at least one server and privileges to run the test as root.
-
-# Expected impact
-
-Ability to measure whether OpenVPN is working from the given network vantage point.
-
-# Expected inputs
-
-A single URL to fetch, supplied by command line argument "--url (-u)".
-OpenVPN configuration file, specified by the command line argument "--openvpn-config (-c)"
-
-# Test description
-
-This test first launches OpenVPN and parses output to determine if it has bootstrapped. After bootstrap, it fetches the URL specified by the --url argument using OpenVPN.
-
-The specific string used to determine bootstrap from OpenVPN output in version
-"0.0.1" is "Initialization Sequence Completed" from standard output.
-
-# Expected output
-
-## Parent data format
-
-None.
-
-## Required output data
-
-success:
-**boolean** The bootstrap status of OpenVPN (success or failure).
-
-OpenVPN_linux --headless:
-**dictionary** the parent key of OpenVPNs output that contains the keys stdout and stderr
-
-stdout:
-**string** Output produced by OpenVPNs standard output.
-
-stderr:
-**string** Error produced by OpenVPNs standard error.
-
-body:
-**string** The page body of a successful HTTP request.
-
-failure:
-**string** If failure, then the corresponding failure message.
-
-## Data specification version number
-
-## Semantics
-
-'success' - True or False - whether OpenVPN has bootstrapped.
-'body' - http page body if successfully requested.
-'failure' - optional, present if there is a failure.
-'l/usr/sbin/openvpn --config configfile':
- 'stdout' - Contents of standard output produced by OpenVPN.
- 'stderr' - Contents of standard error produced by OpenVPN.
-
-## Possible conclusions
-
-We can determine whether or not OpenVPN is able to bootstrap, according to its output.
-We can determine whether or not a given URL is reachable via OpenVPN.
-
-## Example output sample
-```
----
-input_hashes: []
-options: [-c, openvpnconfigfile.ovpn, -u, '']
-probe_asn: AS0
-probe_cc: ZZ
-probe_city: null
-probe_ip: 127.0.0.1
-report_id: nqvK7YrK6J5Di7BiWDwPUBfyKcbLoVWeU4DgnxTzzKWMQABvhC2l3q6aLUwF0CA9
-software_name: ooniprobe
-software_version: 1.3.1
-start_time: 1444925440.0
-test_helpers: {}
-test_name: test_openvpn_circumvent
-test_version: 0.0.1
-...
----
-/usr/sbin/openvpn --config /pathtoopenvpnconfigfile/openvpnconfigfile.ovpn: {
- exit_reason: process_done, stderr: '', stdout: 'Thu Oct 15 20:10:40 2015 OpenVPN
- 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH]
- [IPv6] built on Dec 1 2014
-
- Thu Oct 15 20:10:40 2015 WARNING: file ''/tmp/openvpn.txt'' is group or others
- accessible
-
- Thu Oct 15 20:10:40 2015 Control Channel Authentication: tls-auth using INLINE
- static key file
-
- Thu Oct 15 20:10:40 2015 Attempting to establish TCP connection with [AF_INET]10.0.0.10:993
- [nonblock]
-
- Thu Oct 15 20:10:41 2015 TCP connection established with [AF_INET]10.0.0.10:993
-
- Thu Oct 15 20:10:41 2015 TCPv4_CLIENT link local: [undef]
-
- Thu Oct 15 20:10:41 2015 TCPv4_CLIENT link remote: [AF_INET]10.0.0.10:993
-
- Thu Oct 15 20:10:41 2015 WARNING: this configuration may cache passwords in memory
- -- use the auth-nocache option to prevent this
-
- Thu Oct 15 20:10:46 2015 [server] Peer Connection Initiated with [AF_INET]10.0.0.10:993
-
- Thu Oct 15 20:10:48 2015 Options error: Unrecognized option or missing parameter(s)
- in [PUSH-OPTIONS]:3: dhcp (2.3.2)
-
- Thu Oct 15 20:10:48 2015 TUN/TAP device tun0 opened
-
- Thu Oct 15 20:10:48 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
-
- Thu Oct 15 20:10:48 2015 /sbin/ip link set dev tun0 up mtu 1500
-
- Thu Oct 15 20:10:48 2015 /sbin/ip addr add dev tun0 local 10.10.0.34 peer 10.10.0.33
-
- Thu Oct 15 20:10:48 2015 Initialization Sequence Completed
-
- '}
-body: "<?xml version=\"1.0\"?>\n<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\"\
- \n \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\"\
- >\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html;charset=utf-8\"\
- \ />\n<title>This is a Tor Exit Router</title>\n\n<!--\n\nThis notice is intended\
- \ to be placed on a virtual host for a domain that\nyour Tor exit node IP reverse\
- \ resolves to so that people who may be about\nto file an abuse complaint would\
- \ check it first before bothering you or\nyour ISP. Ex:\nhttp://tor-exit.yourdomain.org\
- \ or http://tor-readme.yourdomain.org.\n\nThis type of setup has proven very effective\
- \ at reducing abuse complaints\nfor exit node operators.\n\nThere are a few places\
- \ in this document that you may want to customize.\nThey are marked with FIXME.\n\
- \n-->\n\n</head>\n<body>\n\n<p style=\"text-align:center; font-size:xx-large; font-weight:bold\"\
- >This is a\nTor Exit Router</p>\n\n<p>\nMost likely you are accessing this website\
- \ because you had some issue with\nthe traffic coming from this IP. This router\
- \ is part of the <a\nhref=\"https://www.torproject.org/\">Tor Anonymity Network</a>,\
- \ which is\ndedicated to <a href=\"https://www.torproject.org/about/overview\">providing\n\
- privacy</a> to people who need it most: average computer users. This\nrouter IP\
- \ should be generating no other traffic, unless it has been\ncompromised.</p>\n\n\
- <p style=\"text-align:center\">\n<a href=\"https://www.torproject.org/about/overview\"\
- >\n<img src=\"how_tor_works_thumb.png\" alt=\"How Tor works\" style=\"border-style:none\"\
- />\n</a></p>\n\n<p>\nTor sees use by <a href=\"https://www.torproject.org/about/torusers\"\
- >many\nimportant segments of the population</a>, including whistle blowers,\njournalists,\
- \ Chinese dissidents skirting the Great Firewall and oppressive\ncensorship, abuse\
- \ victims, stalker targets, the US military, and law\nenforcement, just to name\
- \ a few. While Tor is not designed for malicious\ncomputer users, it is true that\
- \ they can use the network for malicious ends.\nIn reality however, the actual amount\
- \ of <a\nhref=\"https://www.torproject.org/docs/faq-abuse\">abuse</a> is quite low.\
- \ This\nis largely because criminals and hackers have significantly better access\
- \ to\nprivacy and anonymity than do the regular users whom they prey upon. Criminals\n\
- can and do <a\nhref=\"http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.htm…"\
- >build,\nsell, and trade</a> far larger and <a\nhref=\"http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distribut…"\
- >more\npowerful networks</a> than Tor on a daily basis. Thus, in the mind of this\n\
- operator, the social need for easily accessible censorship-resistant private,\n\
- anonymous communication trumps the risk of unskilled bad actors, who are\nalmost\
- \ always more easily uncovered by traditional police work than by\nextensive monitoring\
- \ and surveillance anyway.</p>\n\n<p>\nIn terms of applicable law, the best way\
- \ to understand Tor is to consider it a\nnetwork of routers operating as common\
- \ carriers, much like the Internet\nbackbone. However, unlike the Internet backbone\
- \ routers, Tor routers\nexplicitly do not contain identifiable routing information\
- \ about the source of\na packet, and no single Tor node can determine both the origin\
- \ and destination\nof a given transmission.</p>\n\n<p>\nAs such, there is little\
- \ the operator of this router can do to help you track\nthe connection further.\
- \ This router maintains no logs of any of the Tor\ntraffic, so there is little that\
- \ can be done to trace either legitimate or\nillegitimate traffic (or to filter\
- \ one from the other). Attempts to\nseize this router will accomplish nothing.</p>\n\
- \n<!-- FIXME: May or may not be US-only. Some non-US tor nodes have in\n fact\
- \ reported DMCA harassment... -->\n\n<p>\nIf you are a representative of a company\
- \ who feels that this router is being\nused to violate the DMCA, please be aware\
- \ that this machine does not host or\ncontain any illegal content. Also be aware\
- \ that network infrastructure\nmaintainers are not liable for the type of content\
- \ that passes over their\nequipment, in accordance with <a\nhref=\"http://www.law.cornell.edu/uscode/text/17/512\"\
- >DMCA\n\"safe harbor\" provisions</a>. In other words, you will have just as much\
- \ luck\nsending a takedown notice to the Internet backbone providers. Please consult\n\
- <a href=\"https://www.torproject.org/eff/tor-dmca-response\">EFF's prepared\nresponse</a>\
- \ for more information on this matter.</p>\n\n<p>For more information, please consult\
- \ the following documentation:</p>\n\n<ol>\n<li><a href=\"https://www.torproject.org/about/overview\"\
- >Tor Overview</a></li>\n<li><a href=\"https://www.torproject.org/docs/faq-abuse\"\
- >Tor Abuse FAQ</a></li>\n<li><a href=\"https://www.torproject.org/eff/tor-legal-faq\"\
- >Tor Legal FAQ</a></li>\n</ol>\n\n<p>\nThat being said, if you still have a complaint\
- \ about the router, you may\nemail the <a href=\"mailto:tor@openvpnconfigfile.ie\">maintainer</a>.\
- \ If\ncomplaints are related to a particular service that is being abused, I will\n\
- consider removing that service from my exit policy, which would prevent my\nrouter\
- \ from allowing that traffic to exit through it. I can only do this on an\nIP+destination\
- \ port basis, however. Common P2P ports are\nalready blocked.</p>\n\n<p>\nYou also\
- \ have the option of blocking this IP address and others on\nthe Tor network if\
- \ you so desire. The Tor project provides a <a\nhref=\"https://check.torproject.org/cgi-bin/TorBulkExitList.py\"\
- >web service</a>\nto fetch a list of all IP addresses of Tor exit nodes that allow\
- \ exiting to a\nspecified IP:port combination, and an official <a\nhref=\"https://www.torproject.org/tordnsel/dist/\"\
- >DNSRBL</a> is also available to\ndetermine if a given IP address is actually a\
- \ Tor exit server. Please\nbe considerate\nwhen using these options. It would be\
- \ unfortunate to deny all Tor users access\nto your site indefinitely simply because\
- \ of a few bad apples.</p>\n\n<p style=\"text-align:center; margin-bottom: 0.5em\"\
- >Exit Node provided by:<p>\n<h2 style=\"text-align: center\"><a style=\"color: black\"\
- \ href=\"http://www.openvpnconfigfile.ie\">DU Pirate Party</a><h2>\n\n</body>\n</html>\n"
-input: null
-success: true
-test_runtime: 8.374207019805908
-test_start_time: 1444925440.0
-...
-```
-
-## Expected Post-processing efforts
-
-# Privacy considerations
-
-OpenVPN does not seek to provide anonymity.
-An adversary can observe that a user is connecting to OpenVPN servers.
-OpenVPN servers can also determine the users location.
-
-# Packet capture considerations
-
-This test does not capture packets by default.
diff --git a/test-specs/ts-015-psiphon.md b/test-specs/ts-015-psiphon.md
new file mode 100644
index 0000000..799fc21
--- /dev/null
+++ b/test-specs/ts-015-psiphon.md
@@ -0,0 +1,148 @@
+# Specification version number
+
+2015-10-11-000
+
+# Specification name
+
+Psiphon Test
+
+# Test preconditions
+
+Have psiphon-circumvention-system (including psiphon-circumvention-system/pyclient/psi_client.py) cloned in the home of the user that runs ooni or somewhere else accessible to the user that runs ooni.
+
+# Expected impact
+
+Ability to measure whether Psiphon is working from the given network vantage point.
+
+# Expected inputs
+
+Optionally:
+A single URL to fetch, supplied by command line argument "--url (-u)".
+Psiphon path, specified by the command line argument "--psiphonpath (-p)"
+The ip:port that Psiphon will use for the SOCKS proxy, with the command line argument "--socksproxy (-s)"
+
+# Test description
+
+This test first check that the Psiphon path exists, then launches Psiphon and parses output to determine if it has bootstrapped. After bootstrap, it fetches google.com (or other URL specified by the --url argument) using Psiphons SOCKS proxy listening on 127.0.0.1:1080 (or otherwise specified by the --socksproxy argument).
+
+The specific string used to determine bootstrap from Psiphon output in version
+"0.0.1" is "Press Ctrl-C to terminate." from standard output.
+
+# Expected output
+
+## Parent data format
+
+The following keys from df-001-httpt.md are used when Psiphon bootstraps: requests, socksproxy, agent.
+When Psiphon is not installed or does not bootstrap, only agent and socksproxy are used.
+
+## Required output data
+
+psiphon_installed:
+**boolean** Whether Psiphon client is found or not (success or failure).
+
+success:
+**boolean** The bootstrap status of Psiphon (success or failure).
+
+/tmp/<temporary file>:
+**dictionary** the parent key of Psiphon's output that contains the keys stdout and stderr and exit_reason
+
+stdout:
+**string** Output produced by Psiphon's standard output.
+
+stderr:
+**string** Error produced by Psiphon's standard error.
+
+## Data specification version number
+
+## Semantics
+
+```
+'psiphon_installed' - True or False - whether Psiphon is found.
+'success' - True or False - whether Psiphon has bootstrapped.
+'body' - http page body if successfully requested.
+'/tmp/<temporary file>':
+ 'stdout' - Contents of standard output produced by Psiphon.
+ 'stderr' - Contents of standard error produced by Psiphon.
+```
+
+
+## Possible conclusions
+
+We can determine whether or not Psiphon is found.
+We can determine whether or not Psiphon is able to bootstrap, according to its output.
+We can determine whether or not a given URL is reachable via Psiphon.
+
+## Example output sample
+```
+---
+input_hashes: []
+options: [-u, google.com]
+probe_asn: AS0
+probe_cc: ZZ
+probe_city: null
+probe_ip: 127.0.0.1
+report_id: 4dAHr0ceNDBmw5lUQ7pBoxqgyUSfP873Qj1zv5VyElnSSTXwcsLYeCv69DsUjb94
+software_name: ooniprobe
+software_version: 1.3.1
+start_time: 1444686051.0
+test_helpers: {}
+test_name: psiphon_test
+test_version: 0.0.1
+...
+---
+/tmp/tmplKg8K3: {exit_reason: process_done, stderr: '', stdout: "./ssh is not a valid\
+ \ executable. Using standard ssh.\r\n\r\nYour SOCKS proxy is now running at 127.0.0.1:1080\r\
+ \n\r\nPress Ctrl-C to terminate.\r\nTerminating...\r\nConnection closed\r\n"}
+agent: agent
+input: null
+psiphon_installed: true
+requests:
+- request:
+ body: null
+ headers: []
+ method: GET
+ tor: {is_tor: false}
+ url: http://google.com
+ response:
+ body: "<HTML><HEAD><meta http-equiv=\"content-type\" content=\"text/html;charset=utf-8\"\
+ >\n<TITLE>301 Moved</TITLE></HEAD><BODY>\n<H1>301 Moved</H1>\nThe document has\
+ \ moved\n<A HREF=\"http://www.google.com/\">here</A>.\r\n</BODY></HTML>\r\n"
+ code: 301
+ headers:
+ - - Content-Length
+ - ['219']
+ - - X-XSS-Protection
+ - [1; mode=block]
+ - - Expires
+ - ['Wed, 11 Nov 2015 21:40:58 UTC']
+ - - Server
+ - [gws]
+ - - Connection
+ - [close]
+ - - Location
+ - ['http://www.google.com/']
+ - - Cache-Control
+ - ['public, max-age=2592000']
+ - - Date
+ - ['Mon, 12 Oct 2015 21:40:58 UTC']
+ - - X-Frame-Options
+ - [SAMEORIGIN]
+ - - Content-Type
+ - [text/html; charset=UTF-8]
+socksproxy: 127.0.0.1:1080
+test_runtime: 7.373162031173706
+test_start_time: 1444686052.0
+...
+```
+
+## Expected Post-processing efforts
+
+# Privacy considerations
+
+Psiphon does not seek to provide anonymity.
+An adversary can observe that a user is connecting to Psiphon servers.
+Psiphon servers can also determine the users location.
+
+# Packet capture considerations
+
+This test does not capture packets by default.
diff --git a/test-specs/ts-016-openvpn.md b/test-specs/ts-016-openvpn.md
new file mode 100644
index 0000000..0346f4a
--- /dev/null
+++ b/test-specs/ts-016-openvpn.md
@@ -0,0 +1,220 @@
+# Specification version number
+
+2015-10-11-000
+
+# Specification name
+
+OpenVPN Test
+
+# Test preconditions
+
+Have OpenVPN installed and configured to work with at least one server and privileges to run the test as root.
+
+# Expected impact
+
+Ability to measure whether OpenVPN is working from the given network vantage point.
+
+# Expected inputs
+
+A single URL to fetch, supplied by command line argument "--url (-u)".
+OpenVPN configuration file, specified by the command line argument "--openvpn-config (-c)"
+
+# Test description
+
+This test first launches OpenVPN and parses output to determine if it has bootstrapped. After bootstrap, it fetches the URL specified by the --url argument using OpenVPN.
+
+The specific string used to determine bootstrap from OpenVPN output in version
+"0.0.1" is "Initialization Sequence Completed" from standard output.
+
+# Expected output
+
+## Parent data format
+
+None.
+
+## Required output data
+
+success:
+**boolean** The bootstrap status of OpenVPN (success or failure).
+
+OpenVPN_linux --headless:
+**dictionary** the parent key of OpenVPNs output that contains the keys stdout and stderr
+
+stdout:
+**string** Output produced by OpenVPNs standard output.
+
+stderr:
+**string** Error produced by OpenVPNs standard error.
+
+body:
+**string** The page body of a successful HTTP request.
+
+failure:
+**string** If failure, then the corresponding failure message.
+
+## Data specification version number
+
+## Semantics
+
+```
+'success' - True or False - whether OpenVPN has bootstrapped.
+'body' - http page body if successfully requested.
+'failure' - optional, present if there is a failure.
+'l/usr/sbin/openvpn --config configfile':
+ 'stdout' - Contents of standard output produced by OpenVPN.
+ 'stderr' - Contents of standard error produced by OpenVPN.
+```
+
+## Possible conclusions
+
+We can determine whether or not OpenVPN is able to bootstrap, according to its output.
+We can determine whether or not a given URL is reachable via OpenVPN.
+
+## Example output sample
+```
+---
+input_hashes: []
+options: [-c, openvpnconfigfile.ovpn, -u, '']
+probe_asn: AS0
+probe_cc: ZZ
+probe_city: null
+probe_ip: 127.0.0.1
+report_id: nqvK7YrK6J5Di7BiWDwPUBfyKcbLoVWeU4DgnxTzzKWMQABvhC2l3q6aLUwF0CA9
+software_name: ooniprobe
+software_version: 1.3.1
+start_time: 1444925440.0
+test_helpers: {}
+test_name: test_openvpn_circumvent
+test_version: 0.0.1
+...
+---
+/usr/sbin/openvpn --config /pathtoopenvpnconfigfile/openvpnconfigfile.ovpn: {
+ exit_reason: process_done, stderr: '', stdout: 'Thu Oct 15 20:10:40 2015 OpenVPN
+ 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH]
+ [IPv6] built on Dec 1 2014
+
+ Thu Oct 15 20:10:40 2015 WARNING: file ''/tmp/openvpn.txt'' is group or others
+ accessible
+
+ Thu Oct 15 20:10:40 2015 Control Channel Authentication: tls-auth using INLINE
+ static key file
+
+ Thu Oct 15 20:10:40 2015 Attempting to establish TCP connection with [AF_INET]10.0.0.10:993
+ [nonblock]
+
+ Thu Oct 15 20:10:41 2015 TCP connection established with [AF_INET]10.0.0.10:993
+
+ Thu Oct 15 20:10:41 2015 TCPv4_CLIENT link local: [undef]
+
+ Thu Oct 15 20:10:41 2015 TCPv4_CLIENT link remote: [AF_INET]10.0.0.10:993
+
+ Thu Oct 15 20:10:41 2015 WARNING: this configuration may cache passwords in memory
+ -- use the auth-nocache option to prevent this
+
+ Thu Oct 15 20:10:46 2015 [server] Peer Connection Initiated with [AF_INET]10.0.0.10:993
+
+ Thu Oct 15 20:10:48 2015 Options error: Unrecognized option or missing parameter(s)
+ in [PUSH-OPTIONS]:3: dhcp (2.3.2)
+
+ Thu Oct 15 20:10:48 2015 TUN/TAP device tun0 opened
+
+ Thu Oct 15 20:10:48 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
+
+ Thu Oct 15 20:10:48 2015 /sbin/ip link set dev tun0 up mtu 1500
+
+ Thu Oct 15 20:10:48 2015 /sbin/ip addr add dev tun0 local 10.10.0.34 peer 10.10.0.33
+
+ Thu Oct 15 20:10:48 2015 Initialization Sequence Completed
+
+ '}
+body: "<?xml version=\"1.0\"?>\n<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\"\
+ \n \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\"\
+ >\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html;charset=utf-8\"\
+ \ />\n<title>This is a Tor Exit Router</title>\n\n<!--\n\nThis notice is intended\
+ \ to be placed on a virtual host for a domain that\nyour Tor exit node IP reverse\
+ \ resolves to so that people who may be about\nto file an abuse complaint would\
+ \ check it first before bothering you or\nyour ISP. Ex:\nhttp://tor-exit.yourdomain.org\
+ \ or http://tor-readme.yourdomain.org.\n\nThis type of setup has proven very effective\
+ \ at reducing abuse complaints\nfor exit node operators.\n\nThere are a few places\
+ \ in this document that you may want to customize.\nThey are marked with FIXME.\n\
+ \n-->\n\n</head>\n<body>\n\n<p style=\"text-align:center; font-size:xx-large; font-weight:bold\"\
+ >This is a\nTor Exit Router</p>\n\n<p>\nMost likely you are accessing this website\
+ \ because you had some issue with\nthe traffic coming from this IP. This router\
+ \ is part of the <a\nhref=\"https://www.torproject.org/\">Tor Anonymity Network</a>,\
+ \ which is\ndedicated to <a href=\"https://www.torproject.org/about/overview\">providing\n\
+ privacy</a> to people who need it most: average computer users. This\nrouter IP\
+ \ should be generating no other traffic, unless it has been\ncompromised.</p>\n\n\
+ <p style=\"text-align:center\">\n<a href=\"https://www.torproject.org/about/overview\"\
+ >\n<img src=\"how_tor_works_thumb.png\" alt=\"How Tor works\" style=\"border-style:none\"\
+ />\n</a></p>\n\n<p>\nTor sees use by <a href=\"https://www.torproject.org/about/torusers\"\
+ >many\nimportant segments of the population</a>, including whistle blowers,\njournalists,\
+ \ Chinese dissidents skirting the Great Firewall and oppressive\ncensorship, abuse\
+ \ victims, stalker targets, the US military, and law\nenforcement, just to name\
+ \ a few. While Tor is not designed for malicious\ncomputer users, it is true that\
+ \ they can use the network for malicious ends.\nIn reality however, the actual amount\
+ \ of <a\nhref=\"https://www.torproject.org/docs/faq-abuse\">abuse</a> is quite low.\
+ \ This\nis largely because criminals and hackers have significantly better access\
+ \ to\nprivacy and anonymity than do the regular users whom they prey upon. Criminals\n\
+ can and do <a\nhref=\"http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.htm…"\
+ >build,\nsell, and trade</a> far larger and <a\nhref=\"http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distribut…"\
+ >more\npowerful networks</a> than Tor on a daily basis. Thus, in the mind of this\n\
+ operator, the social need for easily accessible censorship-resistant private,\n\
+ anonymous communication trumps the risk of unskilled bad actors, who are\nalmost\
+ \ always more easily uncovered by traditional police work than by\nextensive monitoring\
+ \ and surveillance anyway.</p>\n\n<p>\nIn terms of applicable law, the best way\
+ \ to understand Tor is to consider it a\nnetwork of routers operating as common\
+ \ carriers, much like the Internet\nbackbone. However, unlike the Internet backbone\
+ \ routers, Tor routers\nexplicitly do not contain identifiable routing information\
+ \ about the source of\na packet, and no single Tor node can determine both the origin\
+ \ and destination\nof a given transmission.</p>\n\n<p>\nAs such, there is little\
+ \ the operator of this router can do to help you track\nthe connection further.\
+ \ This router maintains no logs of any of the Tor\ntraffic, so there is little that\
+ \ can be done to trace either legitimate or\nillegitimate traffic (or to filter\
+ \ one from the other). Attempts to\nseize this router will accomplish nothing.</p>\n\
+ \n<!-- FIXME: May or may not be US-only. Some non-US tor nodes have in\n fact\
+ \ reported DMCA harassment... -->\n\n<p>\nIf you are a representative of a company\
+ \ who feels that this router is being\nused to violate the DMCA, please be aware\
+ \ that this machine does not host or\ncontain any illegal content. Also be aware\
+ \ that network infrastructure\nmaintainers are not liable for the type of content\
+ \ that passes over their\nequipment, in accordance with <a\nhref=\"http://www.law.cornell.edu/uscode/text/17/512\"\
+ >DMCA\n\"safe harbor\" provisions</a>. In other words, you will have just as much\
+ \ luck\nsending a takedown notice to the Internet backbone providers. Please consult\n\
+ <a href=\"https://www.torproject.org/eff/tor-dmca-response\">EFF's prepared\nresponse</a>\
+ \ for more information on this matter.</p>\n\n<p>For more information, please consult\
+ \ the following documentation:</p>\n\n<ol>\n<li><a href=\"https://www.torproject.org/about/overview\"\
+ >Tor Overview</a></li>\n<li><a href=\"https://www.torproject.org/docs/faq-abuse\"\
+ >Tor Abuse FAQ</a></li>\n<li><a href=\"https://www.torproject.org/eff/tor-legal-faq\"\
+ >Tor Legal FAQ</a></li>\n</ol>\n\n<p>\nThat being said, if you still have a complaint\
+ \ about the router, you may\nemail the <a href=\"mailto:tor@openvpnconfigfile.ie\">maintainer</a>.\
+ \ If\ncomplaints are related to a particular service that is being abused, I will\n\
+ consider removing that service from my exit policy, which would prevent my\nrouter\
+ \ from allowing that traffic to exit through it. I can only do this on an\nIP+destination\
+ \ port basis, however. Common P2P ports are\nalready blocked.</p>\n\n<p>\nYou also\
+ \ have the option of blocking this IP address and others on\nthe Tor network if\
+ \ you so desire. The Tor project provides a <a\nhref=\"https://check.torproject.org/cgi-bin/TorBulkExitList.py\"\
+ >web service</a>\nto fetch a list of all IP addresses of Tor exit nodes that allow\
+ \ exiting to a\nspecified IP:port combination, and an official <a\nhref=\"https://www.torproject.org/tordnsel/dist/\"\
+ >DNSRBL</a> is also available to\ndetermine if a given IP address is actually a\
+ \ Tor exit server. Please\nbe considerate\nwhen using these options. It would be\
+ \ unfortunate to deny all Tor users access\nto your site indefinitely simply because\
+ \ of a few bad apples.</p>\n\n<p style=\"text-align:center; margin-bottom: 0.5em\"\
+ >Exit Node provided by:<p>\n<h2 style=\"text-align: center\"><a style=\"color: black\"\
+ \ href=\"http://www.openvpnconfigfile.ie\">DU Pirate Party</a><h2>\n\n</body>\n</html>\n"
+input: null
+success: true
+test_runtime: 8.374207019805908
+test_start_time: 1444925440.0
+...
+```
+
+## Expected Post-processing efforts
+
+# Privacy considerations
+
+OpenVPN does not seek to provide anonymity.
+An adversary can observe that a user is connecting to OpenVPN servers.
+OpenVPN servers can also determine the users location.
+
+# Packet capture considerations
+
+This test does not capture packets by default.
1
0

[spec/master] Update to reflect normalisations performed in pipeline the specs of the base and the HTTP data formats
by art@torproject.org 09 May '16
by art@torproject.org 09 May '16
09 May '16
commit 2e519c8da7946467e3615f05d0da1a12be920fe8
Author: Arturo Filastò <arturo(a)filasto.net>
Date: Wed Jan 27 12:04:53 2016 +0100
Update to reflect normalisations performed in pipeline the specs of the base and the HTTP data formats
---
data-formats/df-000-base.md | 166 +++++++++++-----------
data-formats/df-001-httpt.md | 328 ++++++++++++++++++++++++++++---------------
2 files changed, 301 insertions(+), 193 deletions(-)
diff --git a/data-formats/df-000-base.md b/data-formats/df-000-base.md
index d0d5378..c1431e3 100644
--- a/data-formats/df-000-base.md
+++ b/data-formats/df-000-base.md
@@ -14,113 +14,116 @@ In this directory shall go only the data format specifications of Test
templates. The Test specific data formats should go in the specification of the
test.
-All data produced from ooniprobe tests is in YAML formatted.
+Data produced by the ooniprobe client can be either in YAML or JSON format.
-Every test that is interested in reporting with ooniprobe MUST use such data
-format.
+YAML is used when writing reports to the users filesystem, while JSON is used
+as a format for the published processed reports.
# Base test data format
This specification is of the basic data format common to all ooniprobe test
outputs.
-Data Format Version: df-000-base-001
+Every entry contains the following common fields. The `test_keys` key will
+contain instead all the keys that are specific to the test in question.
+
+The JSON data format is made up of a series of JSON documents separated by
+newline characters.
+
+Data Format Version: 0.2.0
## Specification
- ###########################################
- # OONI Probe Report for HTTP Requests test
- # Wed Jan 30 21:03:56 2013
- ###########################################
- ---
- options:
- A dict containing the keys and values of options passed to the test.
+```
+{
+ "input": "If the test takes an input this will contain the value of it"
+ " these can be for example URLs, hostnames, IPs, etc.",
- probe_asn:
- The AS Number of the probe (prefixed by AS, ex. AS1234) or null if includeasn is set to false.
+ "input_hashes": "A list of the SHA256 hash of encoded "
+ "as hex of the inputs to this test.",
- probe_cc:
- The two letter country code of the probe or null if inlcudecc is set to false.
+ "id": "This is an identifier of this particular measurement",
- probe_ip:
- The IPv4 address of the probe or null if includeip is set to false.
+ "bucket_date": "A date in the format of %Y-%m-%d that indicates "
+ "when the report was processed by the data pipeline"
- software_name:
- The name of the software that has generated such report (ex. ooniprobe).
+ "data_format_version": "0.1.0|0.2.0",
- software_version:
- The version of the software that has generated such report (ex. 0.0.10).
+ "report_filename": "{bucket_date}/{timestamp as '%Y%m%dT%h%M%sZ'}-{probe_cc}-{probe_asn}-{test_name}-{report_id}-{data_format_version}-{probe|backend}.json",
- start_time:
- The time at which the test was started in seconds since epoch.
+ "options": ["A list of options passed to the test as command line arguments"],
- test_name:
- The name of the test that such report is for (ex. HTTP Requests).
+ "probe_asn": "The AS Number of the probe (prefixed by AS, ex. AS1234) "
+ "or AS0 if includeasn is set to false.",
- test_version:
- The version of the test that such report is for (ex. 0.0.10).
+ "probe_cc": "The two letter country code of the probe or ZZ if "
+ "inlcudecountry is set to false.",
- data_format_version:
- The version string of the data format being used by the test (ex. httpt-000)
-
- report_id:
- A 64 character mixed case string that is generated by the client used to identify the report.
+ "probe_ip": "The IPv4 address of the probe or 127.0.0.1 if "
+ "includeip is set to false.",
- test_helpers:
- A dictionary with as keys the names of the options and values the addresses of the test helpers used
- ...
+ "probe_ip": "The name of the city of the probe or null if "
+ "includecity is set to false.",
-# Example output
+ "report_id": "20140130T111423Z_ELNkuajQzUWfktBupbfZUxseQDczEvEaIhtciykhoLSuiNiCCV",
- ###########################################
- # OONI Probe Report for HTTP Invalid Request Line test
- # Mon Jan 28 21:33:59 2013
- ###########################################
- ---
- options:
- collector: null
- help: 0
- logfile: null
- parallelism: '10'
- pcapfile: null
- reportfile: null
- resume: 0
- subargs: [-b, 'http://93.95.227.200']
- test: nettests/manipulation/http_invalid_request_line.py
- probe_asn: null
- probe_cc: null
- probe_ip: null
- software_name: ooniprobe
- software_version: 0.0.10
- start_time: 1359401639.0
- test_name: HTTP Invalid Request Line
- test_version: 0.1.3
- test_helpers: {backend: "http://93.95.227.200"}
- report_id: xxxxxxxXXXxXXXxxxxxxxxxxxxXXXxXXXxsxxxXXXxXXXxxxXXXxXXXxxxXXXxX
- ...
-
-
-# Report Entry data format
-
-Every iteration over an input given to a test will produce a Report Entry.
-
-A Report Entry is a YAML Stream as specified here:
-http://www.yaml.org/spec/1.2/spec.html#id2801681
-
-Here are specified the keys that will always be present inside of every report
-entry.
+ "software_name": "The name of the software that has generated "
+ "such report (ex. ooniprobe)",
-## Specification
+ "software_version": "The version of the software used to generate this report",
+
+ "backend_version": "The version of the backend that collected this measurement",
+
+ "test_helpers": null,
-input:
- The item we this specific test instance is referring to. null in case no
- input is being iterated over.
+ "test_name": "The name of the test that generated "
+ "this measurement (ex. http_requests)",
-test_runtime:
- `float` the runtime of the test
+ "test_version": "",
-test_start_time:
- `float` seconds since epoch from the starting of the test.
+ "test_runtime": null,
+
+ "test_start_time": "Timestamp of when the measurement was performed in "
+ "UTC time coordinates (ex. 2015-08-24 12:02:23)",
+
+ "test_keys": {
+ "The keys that are specific to the test"
+ }
+}
+```
+
+# Example output
+
+```
+{
+ "bucket_date": "2015-11-22",
+ "data_format_version": "0.2.0",
+ "id": "07873c37-9441-47e3-93b8-94db10444c64",
+ "input": "http://example.com/",
+ "options": [
+ "-f",
+ "37e60e13536f6afe47a830bfb6b371b5cf65da66d7ad65137344679b24fdccd1"
+ ],
+ "probe_asn": "AS0",
+ "probe_cc": "CH",
+ "probe_ip": "127.0.0.1",
+ "report_filename": "2015-11-22/20151122T103202Z-CH-AS0-http_requests-XsQk40qrhgvJEdbXAUFzYjbbGCBuEsc1UV5RAAFXo4hysiUo3qyTfo4NTr7MjiwN-0.1.0-probe.json",
+ "report_id": "XsQk40qrhgvJEdbXAUFzYjbbGCBuEsc1UV5RAAFXo4hysiUo3qyTfo4NTr7MjiwN",
+ "software_name": "ooniprobe",
+ "software_version": "1.3.1",
+ "backend_version": "1.1.4",
+ "test_helpers": {},
+ "input_hashes": [
+ "37e60e13536f6afe47a830bfb6b371b5cf65da66d7ad65137344679b24fdccd1"
+ ],
+ "test_name": "http_requests",
+ "test_runtime": 0.1842639446,
+ "test_start_time": "2015-11-22 10:32:02",
+ "test_version": "0.2.4"
+ "test_keys": {
+ },
+}
+```
# Error strings
@@ -164,4 +167,3 @@ error_string:
* This will be the error message if the task has timed out: `task_timed_out`
* Every other failure: 'unknown_failure %s' % str(failure.value)
-
diff --git a/data-formats/df-001-httpt.md b/data-formats/df-001-httpt.md
index ed8fb63..8479a6d 100644
--- a/data-formats/df-001-httpt.md
+++ b/data-formats/df-001-httpt.md
@@ -1,6 +1,6 @@
# HTTPTest template data format
-Data Format Version: df-001-httpt-000
+Data Format Version: 0.2.0
This is the specification of the data format that every test that is
based on ooni.templates.httpt.HTTPTest shall be using.
@@ -10,116 +10,222 @@ data format.
## Specification
- ---
- requests:
- - request:
- headers:
- `dict` the headers of the request
- body:
- `string` the body of the response
-
- url:
- `string` the URL of the request being made (if prefixed with 's' it means
- the request was made via the Tor SOCKS proxy)
-
- method:
- `string` the HTTP method being used
-
- response:
- headers:
- `dict` the headers of the response
- body:
- `string` the body of the response
-
- code:
- `int` the response status code
-
- failure:
- `string` (optional) this will be set if an error was returned.
- For a list of error messages see the Error strings section of
- df-000-base.md.
-
- - request:
- etc. etc.
-
- socksproxy:
- null if no socks proxy was used for this request or an IP port
- combination (as a string) if a SOCKS proxy was used.
-
- agent:
- either 'agent' if 30X redirects should not be followed or 'redirect' if
- they should be followed.
-
- ...
+```
+"agent": "agent|redirect depending on weither the client "
+ "will ignore 30X redirects or follow them.",
+
+"socksproxy": "null | IP:PORT of the socksproxy to be used to "
+ "perform the experiment requests on",
+
+"requests": [
+ {
+ "failure": "This will contain an error string for why the "
+ "request failed or null if no failure occurred",
+
+ "request": {
+ "body": "If the request of the client contains some payload it "
+ "will be in here, otherwise it is set to null",
+
+ "headers": {
+ "Header-Name": "Header-Value"
+ },
+
+ "method": "GET|POST|PUT",
+ "tor": {
+ "exit_ip": "The address of the Tor exit used for the request or "
+ "null if Tor was not used or the test was run with an older version of ooniprobe.",
+
+ "exit_name": "The name of the Tor exit used for the request or "
+ "null if Tor was not used or the test was run with an older version of ooniprobe.",
+
+ "is_tor": "true|false depending on wether or not "
+ "this request was done over Tor or not."
+ },
+ "url": "The URL of the request that has been performed."
+ },
+ "response": {
+ "body": "The body of the response or null if not response was found. If the response is binary "
+ "then this will be a dictionary containing the format in which the binary data is encoded and "
+ "the encoded data (ex. {"format": "base64", "data": "AQI="}). "
+ "Currently the only type of format supported is base64.",
+
+ "headers": {
+ "Header-Name": "Header-Value"
+ }
+ },
+ "response_length": null
+ }
+]
+```
## Example output
- input: http://google.com/
- agent: agent
- requests:
- - request:
- body: null
- headers:
- - - User-Agent
- - - &id001 [Mozilla/4.0 (compatible; MSIE 5.0; Windows NT 5.1; .NET CLR 1.1.4322),
- 'Internet Explorer 5, Windows XP']
- method: GET
- url: http://google.com/
- response:
- body: ''
- code: 301
- headers:
- - - Content-Length
- - ['219']
- - - X-XSS-Protection
- - [1; mode=block]
- - - Expires
- - ['Tue, 29 Jan 2013 14:29:19 GMT']
- - - Server
- - [gws]
- - - Connection
- - [close]
- - - Location
- - ['http://www.google.com/']
- - - Cache-Control
- - ['public, max-age=2592000']
- - - Date
- - ['Sun, 30 Dec 2012 14:29:19 GMT']
- - - X-Frame-Options
- - [SAMEORIGIN]
- - - Content-Type
- - [text/html; charset=UTF-8]
- - request:
- body: null
- headers:
- - - User-Agent
- - - *id001
- method: GET
- url: shttp://google.com/
- response:
- body: ''
- code: 301
- headers:
- - - Content-Length
- - ['219']
- - - X-XSS-Protection
- - [1; mode=block]
- - - Expires
- - ['Tue, 29 Jan 2013 14:29:20 GMT']
- - - Server
- - [gws]
- - - Connection
- - [close]
- - - Location
- - ['http://www.google.com/']
- - - Cache-Control
- - ['public, max-age=2592000']
- - - Date
- - ['Sun, 30 Dec 2012 14:29:20 GMT']
- - - X-Frame-Options
- - [SAMEORIGIN]
- - - Content-Type
- - [text/html; charset=UTF-8]
- socksproxy: null
-
-
+```
+{
+ "bucket_date": "2015-11-22",
+ "data_format_version": "0.2.0",
+ "id": "07873c37-9441-47e3-93b8-94db10444c64",
+ "input": "http://googleusercontent.com/",
+ "options": [
+ "-f",
+ "37e60e13536f6afe47a830bfb6b371b5cf65da66d7ad65137344679b24fdccd1"
+ ],
+ "probe_asn": "AS0",
+ "probe_cc": "CH",
+ "probe_ip": "127.0.0.1",
+ "report_filename": "2015-11-22/20151122T103202Z-CH-AS0-http_requests-XsQk40qrhgvJEdbXAUFzYjbbGCBuEsc1UV5RAAFXo4hysiUo3qyTfo4NTr7MjiwN-0.1.0-probe.json",
+ "report_id": "XsQk40qrhgvJEdbXAUFzYjbbGCBuEsc1UV5RAAFXo4hysiUo3qyTfo4NTr7MjiwN",
+ "software_name": "ooniprobe",
+ "software_version": "1.3.1",
+ "test_helpers": {},
+ "backend_version": "1.1.4",
+ "input_hashes": [
+ "37e60e13536f6afe47a830bfb6b371b5cf65da66d7ad65137344679b24fdccd1"
+ ],
+ "probe_city": null,
+ "test_name": "http_requests",
+ "test_runtime": 0.1842639446,
+ "test_start_time": "2015-11-22 10:32:02",
+ "test_version": "0.2.4"
+ "test_keys": {
+ "agent": "agent",
+ "body_length_match": null,
+ "body_proportion": null,
+ "control_failure": "socks_host_unreachable",
+ "experiment_failure": "dns_lookup_error",
+ "factor": 0.8,
+ "headers_diff": null,
+ "headers_match": null,
+ "requests": [
+ {
+ "failure": "dns_lookup_error",
+ "request": {
+ "body": null,
+ "headers": {
+ "User-Agent": "Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2) Gecko/20100115 Firefox/3.6"
+ },
+ "method": "GET",
+ "tor": {
+ "exit_ip": false,
+ "exit_name": false,
+ "is_tor": false
+ },
+ "url": "http://googleusercontent.com/"
+ },
+ "response": {
+ "body": null,
+ "headers": {}
+ },
+ "response_length": null
+ },
+ {
+ "failure": "socks_host_unreachable",
+ "request": {
+ "body": null,
+ "headers": {
+ "User-Agent": "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.7) Gecko/20091221 Firefox/3.5.7"
+ },
+ "method": "GET",
+ "tor": {
+ "exit_ip": null,
+ "exit_name": null,
+ "is_tor": true
+ },
+ "url": "http://googleusercontent.com/"
+ },
+ "response": {
+ "body": null,
+ "headers": {}
+ },
+ "response_length": null
+ },
+ {
+ "failure": "dns_lookup_error",
+ "request": {
+ "body": null,
+ "headers": {
+ "User-Agent": "Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2) Gecko/20100115 Firefox/3.6"
+ },
+ "method": "GET",
+ "tor": {
+ "exit_ip": null,
+ "exit_name": null,
+ "is_tor": false
+ },
+ "url": "http://googleusercontent.com/"
+ },
+ "response": {
+ "body": null,
+ "headers": {}
+ },
+ "response_length": null
+ },
+ {
+ "failure": "dns_lookup_error",
+ "request": {
+ "body": null,
+ "headers": {
+ "User-Agent": "Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2) Gecko/20100115 Firefox/3.6"
+ },
+ "method": "GET",
+ "tor": {
+ "exit_ip": null,
+ "exit_name": null,
+ "is_tor": false
+ },
+ "url": "http://googleusercontent.com/"
+ },
+ "response": {
+ "body": null,
+ "headers": {}
+ },
+ "response_length": null
+ },
+ {
+ "failure": "socks_host_unreachable",
+ "request": {
+ "body": null,
+ "headers": {
+ "User-Agent": "Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2) Gecko/20100115 Firefox/3.6"
+ },
+ "method": "GET",
+ "tor": {
+ "exit_ip": null,
+ "exit_name": null,
+ "is_tor": true
+ },
+ "url": "http://googleusercontent.com/"
+ },
+ "response": {
+ "body": null,
+ "headers": {}
+ },
+ "response_length": null
+ },
+ {
+ "failure": "socks_host_unreachable",
+ "request": {
+ "body": null,
+ "headers": {
+ "User-Agent": "Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2) Gecko/20100115 Firefox/3.6"
+ },
+ "method": "GET",
+ "tor": {
+ "exit_ip": null,
+ "exit_name": null,
+ "is_tor": true
+ },
+ "url": "http://googleusercontent.com/"
+ },
+ "response": {
+ "body": null,
+ "headers": {}
+ },
+ "response_length": null
+ }
+ ],
+ "socksproxy": null,
+ "start_time": 1448184722.0
+ }
+}
+```
1
0

09 May '16
commit 7c59c2fb301e79803db8ff5fb339e45d37e8da77
Author: Arturo Filastò <arturo(a)filasto.net>
Date: Wed Jan 27 13:04:55 2016 +0100
Update the specifications of DNS and Scapy
---
data-formats/df-002-dnst.md | 268 ++++++++++++------
data-formats/df-003-scapy.md | 661 ++++++++++++++++++++++++++++++++++++-------
2 files changed, 748 insertions(+), 181 deletions(-)
diff --git a/data-formats/df-002-dnst.md b/data-formats/df-002-dnst.md
index a3e7909..4e1ac26 100644
--- a/data-formats/df-002-dnst.md
+++ b/data-formats/df-002-dnst.md
@@ -1,6 +1,6 @@
# DNSTest template data format
-Data Format Version: df-001-dnst-000
+Data Format Version: 0.2.0
This is the specification of the data format that every test that is
based on ooni.templates.dnst.DNSTest shall be using.
@@ -10,97 +10,193 @@ data format.
## Specification
- queries:
- `list` of DNS query and answers for this testing session
+```
+"queries": [
+ {
+ "failure": "null or a string representing the failure",
-Every DNS query is formatted as follows:
+ "hostname":
+ "The hostname used in the DNS query. For PTR lookups this will be the reversed "
+ "ipv4 address in the form: xxx.xxx.xxx.xxx.in-addr.arpa.",
- addrs:
- `list` present if the DNS query is question is of A type and will include
- the IPv4 addresses of the answer.
+ "query_type": "A | MX | PTR | SOA",
- answers:
- - [`string` representation of the Resource Record of the answer (repr),
- `string` representation of the answer payload (python repr)]
- - [etc. etc.]
+ "resolver_hostname":
+ "The hostname of the DNS resolver being used",
- query:
- `string` that is the representation (python repr) of the DNS querie(s)
- that where performed.
- This string can be passed to an instance of `twisted.names.client.Resolver`
- and it will reproduce the DNS query of this report.
- The Query object is described in `twisted.names.dns.Query`.
+ "resolver_port":
+ "The port of the DNS resolver being used"
- query_type:
- `string` the name of the DNS query that is being performed.
+ "answers": [
+ {
+ "answer_type": "A | MX | PTR | SOA | CNAME",
- resolver: [`string` resolver IP address, `int` resolver port number]
+ "ipv4":
+ "(only for A answers) The dotted quad of the IPV4 address",
-## Example output
+ "ttl": "The ttl of the Returned resource record",
+
+ "hostname":
+ "(only for PTR, SOA and CNAME answers)"
+ "For PTR lookups it is the hostname that points back to the queried IP."
+ "For CNAME lookups it is the hostname of the alias for the IP."
+ "For SOA answers it is the hostname of the nameserver "
+ "responsible for the data of this zone."
+
+ "responsible_name":
+ "(only for SOA answers) The mailbox of the person responsible "
+ "for this zone."
+
+ "serial_number":
+ "(only for SOA answers) Version number of the original copy of "
+ "the zone."
+
+ "refresh_interval":
+ "(only for SOA answers) The time interval before which this "
+ "zone should be refreshed."
+
+ "retry_interval":
+ "(only for SOA answers) The time interval that should be "
+ "elapsed before the zone should be retried in case of failure."
- input: example.com
- queries:
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=2562s auth=False>, <A address=203.0.113.2
- ttl=2562>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: *id001
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.3, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=4007s auth=False>, <A address=203.0.113.2
- ttl=4007>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.4, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.5, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.6, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.7, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.8, 53]
- - query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.9, 53]
- - query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.1, 53]
- - failure: deferred_timeout_error
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.10, 53]
- test_name: test_a_lookup
- test_runtime: 2.6424369812011719
- test_started: 1357167921.0688701
- ...
+ "minimum_ttl":
+ "(only for SOA answers) The minimum ttl to be exported with "
+ "any record from this zone."
+
+ "expiration_limit":
+ "(only for SOA answers) The time after which this zone should "
+ "no longer be authoritative."
+ }
+ ],
+
+
+ }
+]
+```
+
+## Example output
+```
+{
+ "bucket_date": "2015-11-23",
+ "data_format_version": "0.2.0",
+ "id": "e6f6257f-e7c2-48fa-8345-b7ed055ab1d2",
+ "input": "198.175.124.185",
+ "options": [
+ "-f",
+ "citizenlab-urls-global.txt",
+ "-T",
+ "dns-server-jo.txt"
+ ],
+ "probe_asn": "AS8376",
+ "probe_cc": "JO",
+ "probe_ip": "127.0.0.1",
+ "report_filename": "2015-11-23/20151123T161428Z-JO-AS8376-dns_consistency-F1KI1WusW4c1T6OGyQDgHJjaSQ1bfpqV2G39bpmuHiLAJnse8R1F44vdRuTz6nO4-0.1.0-probe.json",
+ "report_id": "F1KI1WusW4c1T6OGyQDgHJjaSQ1bfpqV2G39bpmuHiLAJnse8R1F44vdRuTz6nO4",
+ "software_name": "ooniprobe",
+ "software_version": "1.3.1",
+ "test_helpers": {
+ "backend": "8.8.8.8:53"
+ },
+ "input_hashes": [
+ "0055f0881fba857d8b48123017d7aec83014e89f057e44b66107f657ec5e2eab"
+ ],
+ "probe_city": null,
+ "backend_version": "1.1.4",
+ "test_keys": {
+ "control_resolver": "8.8.8.8:53",
+ "errors": {
+ "212.118.0.1": "no_answer",
+ "212.118.0.2": "no_answer",
+ "212.38.128.3": "dns_lookup_error",
+ "217.144.6.6": "no_answer",
+ "8.8.8.8:53": "no_answer",
+ "80.90.160.135": "dns_lookup_error",
+ "80.90.160.172": "dns_lookup_error",
+ "81.28.112.2": "dns_lookup_error"
+ },
+ "failed": [
+ "80.90.160.172",
+ "8.8.8.8:53",
+ "212.118.0.2",
+ "80.90.160.135",
+ "212.38.128.3",
+ "212.118.0.1",
+ "217.144.6.6",
+ "81.28.112.2"
+ ],
+ "queries": [
+ {
+ "answers": [],
+ "failure": "no_answer",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "8.8.8.8",
+ "resolver_port": 53
+ },
+ {
+ "answers": [],
+ "failure": "deferred_timeout_error",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "212.38.128.3",
+ "resolver_port": 53
+ },
+ {
+ "answers": [],
+ "failure": "no_answer",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "217.144.6.6",
+ "resolver_port": 53
+ },
+ {
+ "answers": [],
+ "failure": "deferred_timeout_error",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "81.28.112.2",
+ "resolver_port": 53
+ },
+ {
+ "answers": [],
+ "failure": "deferred_timeout_error",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "80.90.160.135",
+ "resolver_port": 53
+ },
+ {
+ "answers": [],
+ "failure": "deferred_timeout_error",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "80.90.160.172",
+ "resolver_port": 53
+ },
+ {
+ "answers": [],
+ "failure": "no_answer",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "212.118.0.1",
+ "resolver_port": 53
+ },
+ {
+ "answers": [],
+ "failure": "no_answer",
+ "hostname": "198.175.124.185",
+ "query_type": "A",
+ "resolver_hostname": "212.118.0.2",
+ "resolver_port": 53
+ }
+ ],
+ "start_time": 1448291668.0,
+ "successful": []
+ },
+ "test_name": "dns_consistency",
+ "test_runtime": 0.0837070942,
+ "test_start_time": "2015-11-23 16:14:28",
+ "test_version": "0.6"
+}
+```
diff --git a/data-formats/df-003-scapy.md b/data-formats/df-003-scapy.md
index c1db4fb..cae1972 100644
--- a/data-formats/df-003-scapy.md
+++ b/data-formats/df-003-scapy.md
@@ -1,113 +1,586 @@
# ScapyTest data format
-Data Format Version: df-003-scapy-000
+Data Format Version: 0.2.0
This specifies the data format for tests that are based on
ooni.templates.scapyt.ScapyTest.
## Specification
- answer_flags:
- `list` of options that are set for determining how to understand if a
- received packet is answer to a sent packet (these only apply to ICMP
- messages)
+**sent_packets** are the packets that have been generated and sent over the
+network by the probe.
- 'ipsrc' means that we check to see if the src and destination ports in
- the ICMP IP citation match.
+**answered_packets** are the packets that match up as answers according to the
+rules defined in the **answers_flags** options.
- 'ipid' means that we look at the IPID in the response to match it up
- to sent packets.
+```
+{
+ "answer_flags": [
+ "List of options that are set for determining how to understand if a"
+ "received packet is answer to a sent packet (these only apply to ICMP"
+ "messages)"
- 'seqack' means that we check if TCP sequence number and ACK match in
- the ICMP citation when processing TCP inside of ICMP.
+ "'ipsrc' means that we check to see if the src and destination ports in"
+ "the ICMP IP citation match."
- sent_packets:
- This contains the list of packets that have been sent.
+ "'ipid' means that we look at the IPID in the response to match it up"
+ "to sent packets."
- - raw_packet:
- `string` BASE64Encoding of packet the packet inclusive of IP
- headers
+ "'seqack' means that we check if TCP sequence number and ACK match in"
+ "the ICMP citation when processing TCP inside of ICMP."
- summary:
- `string` human readable representation of the packet as is the
- output of scapy.packet.summary().
-
- - etc. etc.
-
- answered_packets:
- This contains the list of packets that are considered to be the
- answer of the above sent packets.
-
- - raw_packet:
- `string` BASE64Encoding of packet the packet inclusive of IP
- headers
-
- summary:
- `string` human readable representation of the packet as is the
- output of scapy.packet.summary().
-
- - etc. etc.
+ ],
+ "answered_packets": [
+ {
+ "raw_packet": {
+ "data": "Encoding of packet the packet inclusive of IP header. "
+ "The type of encoding is specified in the format field."
+ "format": "The encoding of the data field. Currently only supports base64."
+ },
+ "summary":
+ "A human readable representation of the packet as is the output "
+ "of repr on the scapy.packet object."
+ },
+ ],
+ "sent_packets": [
+ {
+ "raw_packet": {
+ "data": "Encoding of packet the packet inclusive of IP header. "
+ "The type of encoding is specified in the format field."
+ "format": "The encoding of the data field. Currently only supports base64."
+ },
+ "summary":
+ "A human readable representation of the packet as is the output "
+ "of repr on the scapy.packet object."
+ },
+ ],
+}
+```
## Example output
- answer_flags: [ipsrc]
- answered_packets:
- - - raw_packet: !!binary |
- RQAAqI08AACAATC61Lw2eX8AAAELACiDAAAAAEUAABzCJ0AAARGEQMCosIAuppOaG2gBuwAIr1EA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIACQ/gAIAQFM9wEB
- summary: IP / ICMP 212.188.54.121 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
- - - raw_packet: !!binary |
- RQAAqI09AACAAUoF1LwdLX8AAAELACiDAAAAAEUAABzCJ0AAARGEQMCosIAuppOaG2gBuwAIr1EA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIACL1wAIAQFSHgEB
- summary: IP / ICMP 212.188.29.45 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
- - - raw_packet: !!binary |
- RQAAOI0+AACAAUn71Lwdpn8AAAELACiDAAAAAEUAABzCJ0AAARGEQMCosIAuppOaG2gBuwAIr1E=
- summary: IP / ICMP 212.188.29.166 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
- - - raw_packet: !!binary |
- RQAAqI0/AACAAUrm1LwcSn8AAAELACiDAAAAAEUAABzCJ0AAARGEQMCosIAuppOaG2gBuwAIr1EA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIACLtwAIAQFOPgUB
- summary: IP / ICMP 212.188.28.74 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
- - - raw_packet: !!binary |
- RQAAOI1BAACAAT4U1Lwpin8AAAELACiDAAAAAEUAABzCJ0AAARGEQMCosIAuppOaG2gBuwAIr1E=
- summary: IP / ICMP 212.188.41.138 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
- - - raw_packet: !!binary |
- RQAAOI1CAACAAYzr2cfVpn8AAAELACiDAAAAAEUAABzCJ0AAARGEQMCosIAuppOaG2gBuwAIr1E=
- summary: IP / ICMP 217.199.213.166 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
- - - raw_packet: !!binary |
- RQAAOI1DAACAAXqrLqaTB38AAAELACiDAAAAAEUAABzCJ0AAARGEQMCosIAuppOaG2gBuwAIr1E=
- summary: IP / ICMP 46.166.147.7 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
- sent_packets:
- - - raw_packet: !!binary |
- RQAAHH1NAAABEftCfwAAAS6mk5obaAG7AAiheQ==
- summary: IP / UDP 127.0.0.1:7016 > 46.166.147.154:https
- - - raw_packet: !!binary |
- RQAAHG71AAACEQibfwAAAS6mk5obaAG7AAiheQ==
- summary: IP / UDP 127.0.0.1:7016 > 46.166.147.154:https
- - - raw_packet: !!binary |
- RQAAHAUlAAADEXFrfwAAAS6mk5obaAG7AAiheQ==
- summary: IP / UDP 127.0.0.1:7016 > 46.166.147.154:https
- - - raw_packet: !!binary |
- RQAAHBqUAAAEEVr8fwAAAS6mk5obaAG7AAiheQ==
- summary: IP / UDP 127.0.0.1:7016 > 46.166.147.154:https
- - - raw_packet: !!binary |
- RQAAHPuMAAAFEXkDfwAAAS6mk5obaAG7AAiheQ==
- summary: IP / UDP 127.0.0.1:7016 > 46.166.147.154:https
- - - raw_packet: !!binary |
- RQAAHK4cAAAGEcVzfwAAAS6mk5obaAG7AAiheQ==
- summary: IP / UDP 127.0.0.1:7016 > 46.166.147.154:https
- - - raw_packet: !!binary |
- RQAAHFyiAAAHERXufwAAAS6mk5obaAG7AAiheQ==
- summary: IP / UDP 127.0.0.1:7016 > 46.166.147.154:https
+```
+{
+ "bucket_date": "2015-11-13",
+ "data_format_version": "0.2.0",
+ "id": "ea9f588b-49ca-4261-babf-0111307877c4",
+ "input": null,
+ "options": [],
+ "probe_asn": "AS8048",
+ "probe_cc": "VE",
+ "probe_ip": "127.0.0.1",
+ "report_filename": "2015-11-13/20151113T104654Z-VE-AS8048-multi_protocol_traceroute-iq0hFnbx4ex7bAvysJBenb9uJAuh7LT02BhDrvIhK6Lpwe7PdCvJ7BHFzm4voYe7-0.1.0-probe.json",
+ "report_id": "iq0hFnbx4ex7bAvysJBenb9uJAuh7LT02BhDrvIhK6Lpwe7PdCvJ7BHFzm4voYe7",
+ "software_name": "ooniprobe",
+ "software_version": "1.3.1",
+ "test_helpers": {
+ "backend": "213.138.109.232"
+ },
+ "backend_version": "1.1.4",
+ "input_hashes": [],
+ "probe_city": null,
+ "test_keys": {
+ "answer_flags": [
+ "ipsrc"
+ ],
+ "answered_packets": [
+ {
+ "raw_packet": {
+ "data": "RcAAOFqPAAAwAeD/1Ypt6AoAAQQDA6VKAAAAAEUAABxEnwAAAREmvAoAAQTVim3oXIYAFgAI+w0=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0xc0 len=56 id=23183 flags= frag=0L ttl=48 proto=icmp chksum=0xe0ff src=213.138.109.232 dst=10.0.1.4 options=[] |<ICMP type=dest-unreach code=port-unreachable chksum=0xa54a unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=17567 flags= frag=0L ttl=1 proto=udp chksum=0x26bc src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=23686 dport=ssh len=8 chksum=0xfb0d |>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAOBGSAAD/AZQuCgABAQoAAQQLAEOQAAAAAEUAABzCWAAAARGpAgoAAQTVim3ocGMAFwAIQO0=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0x0 len=56 id=4498 flags= frag=0L ttl=255 proto=icmp chksum=0x942e src=10.0.1.1 dst=10.0.1.4 options=[] |<ICMP type=time-exceeded code=ttl-zero-during-transit chksum=0x4390 unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=49752 flags= frag=0L ttl=1 proto=udp chksum=0xa902 src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=28771 dport=telnet len=8 chksum=0x40ed |>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RcAAOD57AADvAetXW986TwoAAQQLAJ1NAAAAAEUAABwySQAAARE5EgoAAQTVim3ogEgANQAI1yw=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0xc0 len=56 id=15995 flags= frag=0L ttl=239 proto=icmp chksum=0xeb57 src=91.223.58.79 dst=10.0.1.4 options=[] |<ICMP type=time-exceeded code=ttl-zero-during-transit chksum=0x9d4d unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=12873 flags= frag=0L ttl=1 proto=udp chksum=0x3912 src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=32840 dport=domain len=8 chksum=0xd72c |>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RcAAOCLEAAAwARjL1Ypt6AoAAQQDA6VKAAAAAEUAABwa6wAACxFGcAoAAQTVim3oZO4AFgAI8qU=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0xc0 len=56 id=8900 flags= frag=0L ttl=48 proto=icmp chksum=0x18cb src=213.138.109.232 dst=10.0.1.4 options=[] |<ICMP type=dest-unreach code=port-unreachable chksum=0xa54a unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=6891 flags= frag=0L ttl=11 proto=udp chksum=0x4670 src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=25838 dport=ssh len=8 chksum=0xf2a5 |>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAOBGYAAD/AZQoCgABAQoAAQQLAEOQAAAAAEUAABxnSAAAAREEEwoAAQTVim3oU6f//wAIXcA=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0x0 len=56 id=4504 flags= frag=0L ttl=255 proto=icmp chksum=0x9428 src=10.0.1.1 dst=10.0.1.4 options=[] |<ICMP type=time-exceeded code=ttl-zero-during-transit chksum=0x4390 unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=26440 flags= frag=0L ttl=1 proto=udp chksum=0x413 src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=21415 dport=65535 len=8 chksum=0x5dc0 |>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RcAAOEz9AADvAdzVW986TwoAAQQLAJ1NAAAAAEUAABxiIAAAAREJOwoAAQTVim3o9N4fkAAIQzs=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0xc0 len=56 id=19709 flags= frag=0L ttl=239 proto=icmp chksum=0xdcd5 src=91.223.58.79 dst=10.0.1.4 options=[] |<ICMP type=time-exceeded code=ttl-zero-during-transit chksum=0x9d4d unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=25120 flags= frag=0L ttl=1 proto=udp chksum=0x93b src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=62686 dport=http_alt len=8 chksum=0x433b |>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RcAAOHZYAADvAbN6W986TwoAAQQLAJ1NAAAAAEUAABwZDgAAARFSTQoAAQTVim3ou3kAUAAIm+A=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0xc0 len=56 id=30296 flags= frag=0L ttl=239 proto=icmp chksum=0xb37a src=91.223.58.79 dst=10.0.1.4 options=[] |<ICMP type=time-exceeded code=ttl-zero-during-transit chksum=0x9d4d unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=6414 flags= frag=0L ttl=1 proto=udp chksum=0x524d src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=47993 dport=http len=8 chksum=0x9be0 |>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAqAJHAAD5AalDCpYAMQoAAQQLAH/9AAAABEUAABxL8AAAAhEeawoAAQTVim3oxtsAFgAIkLiqqgAWAAjHuqqqABYACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAD5AwAIAQED8+H/",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0x0 len=168 id=583 flags= frag=0L ttl=249 proto=icmp chksum=0xa943 src=10.150.0.49 dst=10.0.1.4 options=[] |<ICMP type=time-exceeded code=ttl-zero-during-transit chksum=0x7ffd unused=4 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=19440 flags= frag=0L ttl=2 proto=udp chksum=0x1e6b src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=50907 dport=ssh len=8 chksum=0x90b8 |<Padding load='\\xaa\\xaa\\x00\\x16\\x00\\x08\\xc7\\xba\\xaa\\xaa\\x00\\x16\\x00\\x08\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00 \\x00\\xf9\\x03\\x00\\x08\\x01\\x01\\x03\
\xf3\\xe1\\xff' |>>>>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAOFaJAAD4AVoOx6g/gQoAAQQLAJ1NAAAAAEUAABw/wAAAARErmwoAAQTVim3o3yEAFgAIeHI=",
+ "format": "base64"
+ },
+ "summary": "[<IP version=4L ihl=5L tos=0x0 len=56 id=22153 flags= frag=0L ttl=248 proto=icmp chksum=0x5a0e src=199.168.63.129 dst=10.0.1.4 options=[] |<ICMP type=time-exceeded code=ttl-zero-during-transit chksum=0x9d4d unused=0 |<IPerror version=4L ihl=5L tos=0x0 len=28 id=16320 flags= frag=0L ttl=1 proto=udp chksum=0x2b9b src=10.0.1.4 dst=213.138.109.232 options=[] |<UDPerror sport=57121 dport=ssh len=8 chksum=0x7872 |>>>>]"
+ }
+ ],
+ "sent_packets": [
+ {
+ "raw_packet": {
+ "data": "RQAAKIc9AAABBuQcCgABBNWKbeiRQgAAAACVawAAAABQAiAAGr4AAA==",
+ "format": "base64"
+ },
+ "summary": "[<IP id=34621 frag=0 ttl=1 proto=tcp dst=213.138.109.232 |<TCP sport=37186 dport=0 seq=38251 flags=S |>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAKADhAAABBmp5CgABBNWKbehsSAAWAACbxwAAAABQAiAAOUYAAA==",
+ "format": "base64"
+ },
+ "summary": "[<IP id=225 frag=0 ttl=1 proto=tcp dst=213.138.109.232 |<TCP sport=27720 dport=ssh seq=39879 flags=S |>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAKO9JAAABBnwQCgABBNWKbeg1bwAXAAApTwAAAABQAiAA4pYAAA==",
+ "format": "base64"
+ },
+ "summary": "[<IP id=61257 frag=0 ttl=1 proto=tcp dst=213.138.109.232 |<TCP sport=13679 dport=telnet seq=10575 flags=S |>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAKNKoAAABBpixCgABBNWKbeixRwA1AABobwAAAABQAiAAJ4AAAA==",
+ "format": "base64"
+ },
+ "summary": "[<IP id=53928 frag=0 ttl=1 proto=tcp dst=213.138.109.232 |<TCP sport=45383 dport=domain seq=26735 flags=S |>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAKPzTAAABBm6GCgABBNWKbejCJwBQAACA3wAAAABQAiAA/hQAAA==",
+ "format": "base64"
+ },
+ "summary": "[<IP id=64723 frag=0 ttl=1 proto=tcp dst=213.138.109.232 |<TCP sport=49703 dport=http seq=32991 flags=S |>>]"
+ },
+ {
+ "raw_packet": {
+ "data": "RQAAKNzQAAABBo6JCgABBNWKbejZyAB7AAD+NQAAAABQAiAAaPIAAA==",
+ "format": "base64"
+ },
+ "summary": "[<IP id=56528 frag=0 ttl=1 proto=tcp dst=213.138.109.232 |<TCP sport=55752 dport=ntp seq=65077 flags=S |>>]"
+ }
+ ],
+ "test_icmp_traceroute": {
+ "hops": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.039386034,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2439029217,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4453678131,
+ "ttl": 12
+ }
+ ]
+ },
+ "test_tcp_traceroute": {
+ "hops_0": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0464248657,
+ "sport": 34854,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2470018864,
+ "sport": 10415,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4521570206,
+ "sport": 0,
+ "ttl": 12
+ }
+ ],
+ "hops_123": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0381779671,
+ "sport": 50988,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.240860939,
+ "sport": 7867,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4443869591,
+ "sport": 123,
+ "ttl": 12
+ }
+ ],
+ "hops_22": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0354959965,
+ "sport": 36980,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2357189655,
+ "sport": 26447,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4381670952,
+ "sport": 22,
+ "ttl": 12
+ }
+ ],
+ "hops_23": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0388379097,
+ "sport": 4690,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2384901047,
+ "sport": 51177,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4421479702,
+ "sport": 23,
+ "ttl": 12
+ }
+ ],
+ "hops_443": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0386300087,
+ "sport": 11218,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.240696907,
+ "sport": 26319,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4430809021,
+ "sport": 443,
+ "ttl": 12
+ }
+ ],
+ "hops_53": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0381169319,
+ "sport": 36901,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2402248383,
+ "sport": 60900,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4425189495,
+ "sport": 53,
+ "ttl": 12
+ }
+ ],
+ "hops_65535": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0387971401,
+ "sport": 57248,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2455801964,
+ "sport": 52285,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4457411766,
+ "sport": 65535,
+ "ttl": 12
+ }
+ ],
+ "hops_80": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.8421959877,
+ "sport": 23745,
+ "ttl": 9
+ },
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0382699966,
+ "sport": 22618,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2403969765,
+ "sport": 45566,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4452321529,
+ "sport": 80,
+ "ttl": 12
+ }
+ ],
+ "hops_8080": [
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0389461517,
+ "sport": 57892,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2410969734,
+ "sport": 51593,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4440560341,
+ "sport": 8080,
+ "ttl": 12
+ }
+ ]
+ },
+ "test_udp_traceroute": {
+ "hops_0": [],
+ "hops_123": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.920017004,
+ "sport": 57583,
+ "ttl": 9
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.24168396,
+ "sport": 18721,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4463579655,
+ "sport": 25517,
+ "ttl": 12
+ }
+ ],
+ "hops_22": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.9136769772,
+ "sport": 45625,
+ "ttl": 9
+ },
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0372998714,
+ "sport": 50609,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2419588566,
+ "sport": 14160,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4428777695,
+ "sport": 23686,
+ "ttl": 12
+ }
+ ],
+ "hops_23": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.9202280045,
+ "sport": 58718,
+ "ttl": 9
+ },
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0369830132,
+ "sport": 39310,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2406070232,
+ "sport": 9348,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4436769485,
+ "sport": 56507,
+ "ttl": 12
+ }
+ ],
+ "hops_443": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.9194400311,
+ "sport": 61062,
+ "ttl": 9
+ },
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0356152058,
+ "sport": 57814,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2425971031,
+ "sport": 36493,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4469130039,
+ "sport": 20708,
+ "ttl": 12
+ }
+ ],
+ "hops_53": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.9192700386,
+ "sport": 63309,
+ "ttl": 9
+ },
+ {
+ "address": "141.136.98.238",
+ "rtt": 2.0371799469,
+ "sport": 44259,
+ "ttl": 10
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2417399883,
+ "sport": 32840,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4441540241,
+ "sport": 6946,
+ "ttl": 12
+ }
+ ],
+ "hops_65535": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.9188029766,
+ "sport": 16637,
+ "ttl": 9
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2441849709,
+ "sport": 56282,
+ "ttl": 11
+ }
+ ],
+ "hops_80": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.9194018841,
+ "sport": 26666,
+ "ttl": 9
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2409110069,
+ "sport": 47993,
+ "ttl": 11
+ },
+ {
+ "address": "213.138.109.232",
+ "rtt": 2.4452769756,
+ "sport": 43930,
+ "ttl": 12
+ }
+ ],
+ "hops_8080": [
+ {
+ "address": "141.136.108.130",
+ "rtt": 1.9188380241,
+ "sport": 53083,
+ "ttl": 9
+ },
+ {
+ "address": "91.223.58.79",
+ "rtt": 2.2436709404,
+ "sport": 62686,
+ "ttl": 11
+ }
+ ]
+ }
+ },
+ "test_name": "multi_protocol_traceroute",
+ "test_runtime": 57.7884280682,
+ "test_start_time": "2015-11-13 10:46:54",
+ "test_version": "0.3"
+}
+```
## Privacy considerations
@@ -121,5 +594,3 @@ the packet they are referring to and it will contain the non anonymized user IP
address).
On this specific issue there is an open ticket here:
https://trac.torproject.org/projects/tor/ticket/7933.
-
-
1
0
commit 83e6e769b2ba3c91a81c521c35073654745c12a7
Author: Arturo Filastò <arturo(a)filasto.net>
Date: Thu Mar 17 14:36:04 2016 +0100
Add measurement_start_time field
---
data-formats/df-000-base.md | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/data-formats/df-000-base.md b/data-formats/df-000-base.md
index aab0f1c..f20aa21 100644
--- a/data-formats/df-000-base.md
+++ b/data-formats/df-000-base.md
@@ -83,8 +83,12 @@ Data Format Version: 0.2.0
"test_runtime": null,
- "test_start_time": "Timestamp of when the measurement was performed in "
- "UTC time coordinates (ex. 2015-08-24 12:02:23)",
+ "measurement_start_time": "Timestamp of when the measurement was performed in "
+ "UTC time coordinates (ex. 2015-08-24 12:02:23) (Note: ooniprobe <= 1.4.0 generates skewed timing information)",
+
+ "test_start_time": "Timestamp of when the test was started in "
+ "UTC time coordinates (ex. 2015-08-24 12:02:23) (Note: ooniprobe <= 1.4.0 generates skewed timing information)",
+
"test_keys": {
"The keys that are specific to the test"
1
0
commit a42b44a57b73e62c7dabc66c6566e0423fa42f5c
Author: Arturo Filastò <arturo(a)filasto.net>
Date: Thu Mar 17 14:36:17 2016 +0100
Update my PGP key to be the latest one
---
Release-Procedure.md | 18 +++++++-----------
1 file changed, 7 insertions(+), 11 deletions(-)
diff --git a/Release-Procedure.md b/Release-Procedure.md
index f19d44c..6256130 100644
--- a/Release-Procedure.md
+++ b/Release-Procedure.md
@@ -177,16 +177,12 @@ All tags should be incremental and they will be signed with either of the
following GPG keys:
```
-pub 4096R/150FE210 2011-10-23 [expires: 2014-11-24]
- Key fingerprint = 46E5 EF37 DE26 4EA6 8DCF 53EA E3A2 1297 150F E210
- uid Arturo Filastò <art(a)torproject.org>
- uid Arturo Filastò <arturo(a)filasto.net>
- uid Arturo Filastò <arturo.filasto(a)logioshermes.org>
- uid Arturo Filastò <art(a)fuffa.org>
- uid Arturo Filastò <art(a)globaleaks.org>
- uid Arturo Filastò <art(a)baculo.org>
- uid Arturo Filastò <hellais(a)gmail.com>
- sub 4096R/F423B27C 2011-10-23 [expires: 2014-11-24]
+pub 3072D/702287F4 2015-10-19 [expires: 2018-05-06]
+ Key fingerprint = 67EF 3966 5099 86E9 6ACE E84E 5D67 CD18 7022 87F4
+uid [ultimate] Arturo Filastò <arturo(a)filasto.net>
+uid [ultimate] Arturo Filastò <art(a)fuffa.org>
+uid [ultimate] Arturo Filastò <art(a)torproject.org>
+sub 2752g/C58FC4EE 2015-10-19 [expires: 2018-05-06]
```
## Versioning scheme
@@ -198,7 +194,7 @@ All OONI tools follow [semantic versioning](http://semver.org/).
To upload a new version to pypi run:
```
-python setup.py sdist upload -s
+python setup.py sdist upload -s --identity=702287F4
```
# Build systems & environments
1
0

[spec/master] Merge pull request #53 from TheTorProject/feature/df-0.2
by art@torproject.org 09 May '16
by art@torproject.org 09 May '16
09 May '16
commit b11344272c179e786810baefa9089a39039d36de
Merge: 3d3bd21 ef8b64b
Author: anadahz <anadahz(a)users.noreply.github.com>
Date: Wed Apr 6 22:34:40 2016 +0000
Merge pull request #53 from TheTorProject/feature/df-0.2
Update data format to include all missing details.
data-formats/df-000-base.md | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
1
0

09 May '16
commit ef8b64b40dfa22303914ae00ef66eea0a815709d
Author: Arturo Filastò <arturo(a)filasto.net>
Date: Tue Apr 5 17:11:16 2016 +0200
Update data format to include all missing details.
---
data-formats/df-000-base.md | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/data-formats/df-000-base.md b/data-formats/df-000-base.md
index f20aa21..c72b3af 100644
--- a/data-formats/df-000-base.md
+++ b/data-formats/df-000-base.md
@@ -49,6 +49,9 @@ Data Format Version: 0.2.0
"data_format_version": "0.1.0|0.2.0",
+ "annotations": "Optional user provided annotations to the report that "
+ "provide metadata to this measurement",
+
"report_filename": "{bucket_date}/{timestamp as '%Y%m%dT%h%M%sZ'}-{probe_cc}-{probe_asn}-{test_name}-{report_id}-{data_format_version}-{probe|backend}.json",
"options": ["A list of options passed to the test as command line arguments"],
@@ -74,7 +77,7 @@ Data Format Version: 0.2.0
"backend_version": "The version of the backend that collected this measurement",
- "test_helpers": null,
+ "test_helpers": {"test_helper_name": "The address of the test helper used"},
"test_name": "The name of the test that generated "
"this measurement (ex. http_requests)",
1
0

[spec/master] Merge pull request #52 from TheTorProject/joe/formatting-fixes
by art@torproject.org 09 May '16
by art@torproject.org 09 May '16
09 May '16
commit aa17e0f06cc09b7b5aa456c03fffb5bf4c561ea8
Merge: b113442 29f56af
Author: anadahz <anadahz(a)users.noreply.github.com>
Date: Tue Apr 12 23:27:36 2016 +0000
Merge pull request #52 from TheTorProject/joe/formatting-fixes
formatting and filename fixes
test-specs/ts-001-bridget.md | 2 +-
test-specs/ts-005-dns-spoof.md | 131 ++++++++---------
test-specs/ts-012-lantern.md | 111 ---------------
test-specs/ts-013-lantern.md | 111 +++++++++++++++
test-specs/ts-013-meek-fronted-requests.md | 111 ---------------
test-specs/ts-014-meek-fronted-requests.md | 111 +++++++++++++++
test-specs/ts-014-psiphon.md | 146 -------------------
test-specs/ts-015-openvpn.md | 218 ----------------------------
test-specs/ts-015-psiphon.md | 148 +++++++++++++++++++
test-specs/ts-016-openvpn.md | 220 +++++++++++++++++++++++++++++
10 files changed, 657 insertions(+), 652 deletions(-)
1
0
commit 3fa9ba4736ab4e9e7494a523444e30c392be3be4
Author: Arturo Filastò <arturo(a)filasto.net>
Date: Wed Jan 27 13:09:18 2016 +0100
Naming consistency changes
---
test-specs/ts-002-dns-consistency.md | 178 ++
test-specs/ts-002-dnsconsistency.md | 178 --
test-specs/ts-004-http-host.md | 256 +++
test-specs/ts-004-httphost.md | 257 ---
test-specs/ts-005-dns-spoof.md | 149 ++
test-specs/ts-005-dnsspoof.md | 149 --
test-specs/ts-008-tcp-connect.md | 98 +
test-specs/ts-008-tcpconnect.md | 98 -
test-specs/ts-009-multi-port-traceroute.md | 2384 ------------------------
test-specs/ts-009-multi-protocol-traceroute.md | 2384 ++++++++++++++++++++++++
10 files changed, 3065 insertions(+), 3066 deletions(-)
diff --git a/test-specs/ts-002-dns-consistency.md b/test-specs/ts-002-dns-consistency.md
new file mode 100644
index 0000000..95ad46b
--- /dev/null
+++ b/test-specs/ts-002-dns-consistency.md
@@ -0,0 +1,178 @@
+# Specification version number
+
+2013-01-30-000
+
+# Specification name
+
+DNS Consistency Test
+
+# Test preconditions
+
+ * An internet connection
+ * A unfiltered connection to a DNS resolver that is not performing censorship
+
+For reporting to the backend to work that it is possible for the probe to
+establish a connection to the Tor network.
+
+# Expected impact
+
+Ability to detect if A DNS queries for a certain hostname are being tampered with.
+
+# Expected inputs
+
+ * A list of hostnames to be tested for censorship
+ * A list of DNS resolvers to be tested for censorship
+ * A DNS resolver that is not being tampered with (control_resolver)
+
+The list of hostnames should be in a text file and separated by newline.
+
+Example:
+
+ one.example.com
+ two.example.com
+ three.example.com
+
+The list of DNS resolvers to test for tampering shold be in a text file as
+dotted quads separated by a newline:
+
+Example:
+
+ 1.1.1.1
+ 2.2.2.2
+ 3.3.3.3
+
+# Test Description
+
+For each hostname to be tested we do the following:
+
+We perform an A DNS query (via UDP) to the control resolver. The answer to such
+query is called the control answer.
+
+For each DNS resolver to be tested we perform an A DNS query for the domain in
+question. We then compare this answer (experiment answer) with the control
+answer.
+
+If the two have a common IPV4 address then the hostname is not considered to be
+tampered with the resolver in question (tampering: False)
+
+If they do not have commonalities we take the first IPV4 address in the control
+answer and the first IPV4 address in the experiment answer and do a reverse
+lookup. If the two reverse lookups match (the PTR record points to the same
+hostname), we take note of this (tampering: "reverse_match").
+
+In any other case we mark the result as: tampering: True.
+
+# Expected output
+
+## Data format
+
+df-002-dnst
+
+## Semantics
+
+Two extra dicts will be present inside of every report entry:
+
+tampering:
+ **dict** containing as keys the IPv4 addresses of the test resolvers
+ and as values True|False|'reverse_match'
+
+test_resolvers:
+ **list** of IPv4 addresses of the test resolvers
+
+## Possible conclusions
+
+That the DNS resolver in question has provided a false response to a DNS Query.
+
+## Expected post-processing efforts
+
+## Example output sample
+
+ input: example.com
+ control_resolver: &id001 [203.0.113.1, 53]
+ queries:
+ - addrs: [203.0.113.2]
+ answers:
+ - [<RR name=example.com type=A class=IN ttl=2562s auth=False>, <A address=203.0.113.2
+ ttl=2562>]
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: *id001
+ - addrs: [203.0.113.2]
+ answers:
+ - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
+ ttl=7200>]
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.3, 53]
+ - addrs: [203.0.113.2]
+ answers:
+ - [<RR name=example.com type=A class=IN ttl=4007s auth=False>, <A address=203.0.113.2
+ ttl=4007>]
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.4, 53]
+ - addrs: [203.0.113.2]
+ answers:
+ - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
+ ttl=7200>]
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.5, 53]
+ - addrs: [203.0.113.2]
+ answers:
+ - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
+ ttl=7200>]
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.6, 53]
+ - addrs: [203.0.113.2]
+ answers:
+ - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
+ ttl=7200>]
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.7, 53]
+ - addrs: [203.0.113.2]
+ answers:
+ - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
+ ttl=7200>]
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.8, 53]
+ - query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.9, 53]
+ - query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.1, 53]
+ - failure: deferred_timeout_error
+ query: '[Query(''example.com'', 1, 1)]'
+ query_type: A
+ resolver: [203.0.113.10, 53]
+ tampering: {203.0.113.11: no_answer, 203.0.113.6: false, 203.0.113.4: false, 203.0.113.5: false,
+ 203.0.113.7: false, 203.0.113.3: false, 203.0.113.9: no_answer, 203.0.113.8: false}
+ test_resolvers: [203.0.113.3, 203.0.113.4, 203.0.113.5, 203.0.113.6, 203.0.113.7,
+ 203.0.113.8, 203.0.113.9, 203.0.113.11, 203.0.113.10]
+ test_name: test_a_lookup
+ test_runtime: 2.6424369812011719
+ test_started: 1357167921.0688701
+ ...
+
+# Privacy considerations
+
+This test does not inherently risk leaking user information.
+
+# Packet capture considerations
+
+We do not do any packet capturing, this test only requires to be able to create
+UDP sockets.
+
+# Notes
+
+Sites that do geolocation based load balancing via DNS will report a different
+set of IPv4 addresses depending on the source of the DNS request. For this
+reason we also do a reverse lookup to check to see if the domain pointers of
+the IP addresses match.
+This means of seeding out false positive, though, is also not that effective
+since in some circumstances also the PTR record will point to a different
+domain name.
diff --git a/test-specs/ts-002-dnsconsistency.md b/test-specs/ts-002-dnsconsistency.md
deleted file mode 100644
index 95ad46b..0000000
--- a/test-specs/ts-002-dnsconsistency.md
+++ /dev/null
@@ -1,178 +0,0 @@
-# Specification version number
-
-2013-01-30-000
-
-# Specification name
-
-DNS Consistency Test
-
-# Test preconditions
-
- * An internet connection
- * A unfiltered connection to a DNS resolver that is not performing censorship
-
-For reporting to the backend to work that it is possible for the probe to
-establish a connection to the Tor network.
-
-# Expected impact
-
-Ability to detect if A DNS queries for a certain hostname are being tampered with.
-
-# Expected inputs
-
- * A list of hostnames to be tested for censorship
- * A list of DNS resolvers to be tested for censorship
- * A DNS resolver that is not being tampered with (control_resolver)
-
-The list of hostnames should be in a text file and separated by newline.
-
-Example:
-
- one.example.com
- two.example.com
- three.example.com
-
-The list of DNS resolvers to test for tampering shold be in a text file as
-dotted quads separated by a newline:
-
-Example:
-
- 1.1.1.1
- 2.2.2.2
- 3.3.3.3
-
-# Test Description
-
-For each hostname to be tested we do the following:
-
-We perform an A DNS query (via UDP) to the control resolver. The answer to such
-query is called the control answer.
-
-For each DNS resolver to be tested we perform an A DNS query for the domain in
-question. We then compare this answer (experiment answer) with the control
-answer.
-
-If the two have a common IPV4 address then the hostname is not considered to be
-tampered with the resolver in question (tampering: False)
-
-If they do not have commonalities we take the first IPV4 address in the control
-answer and the first IPV4 address in the experiment answer and do a reverse
-lookup. If the two reverse lookups match (the PTR record points to the same
-hostname), we take note of this (tampering: "reverse_match").
-
-In any other case we mark the result as: tampering: True.
-
-# Expected output
-
-## Data format
-
-df-002-dnst
-
-## Semantics
-
-Two extra dicts will be present inside of every report entry:
-
-tampering:
- **dict** containing as keys the IPv4 addresses of the test resolvers
- and as values True|False|'reverse_match'
-
-test_resolvers:
- **list** of IPv4 addresses of the test resolvers
-
-## Possible conclusions
-
-That the DNS resolver in question has provided a false response to a DNS Query.
-
-## Expected post-processing efforts
-
-## Example output sample
-
- input: example.com
- control_resolver: &id001 [203.0.113.1, 53]
- queries:
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=2562s auth=False>, <A address=203.0.113.2
- ttl=2562>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: *id001
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.3, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=4007s auth=False>, <A address=203.0.113.2
- ttl=4007>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.4, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.5, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.6, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.7, 53]
- - addrs: [203.0.113.2]
- answers:
- - [<RR name=example.com type=A class=IN ttl=7200s auth=False>, <A address=203.0.113.2
- ttl=7200>]
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.8, 53]
- - query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.9, 53]
- - query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.1, 53]
- - failure: deferred_timeout_error
- query: '[Query(''example.com'', 1, 1)]'
- query_type: A
- resolver: [203.0.113.10, 53]
- tampering: {203.0.113.11: no_answer, 203.0.113.6: false, 203.0.113.4: false, 203.0.113.5: false,
- 203.0.113.7: false, 203.0.113.3: false, 203.0.113.9: no_answer, 203.0.113.8: false}
- test_resolvers: [203.0.113.3, 203.0.113.4, 203.0.113.5, 203.0.113.6, 203.0.113.7,
- 203.0.113.8, 203.0.113.9, 203.0.113.11, 203.0.113.10]
- test_name: test_a_lookup
- test_runtime: 2.6424369812011719
- test_started: 1357167921.0688701
- ...
-
-# Privacy considerations
-
-This test does not inherently risk leaking user information.
-
-# Packet capture considerations
-
-We do not do any packet capturing, this test only requires to be able to create
-UDP sockets.
-
-# Notes
-
-Sites that do geolocation based load balancing via DNS will report a different
-set of IPv4 addresses depending on the source of the DNS request. For this
-reason we also do a reverse lookup to check to see if the domain pointers of
-the IP addresses match.
-This means of seeding out false positive, though, is also not that effective
-since in some circumstances also the PTR record will point to a different
-domain name.
diff --git a/test-specs/ts-004-http-host.md b/test-specs/ts-004-http-host.md
new file mode 100644
index 0000000..1bf7eec
--- /dev/null
+++ b/test-specs/ts-004-http-host.md
@@ -0,0 +1,256 @@
+# Specification version number
+
+2013-02-26-000
+
+# Specification name
+
+HTTP Host test
+
+# Test preconditions
+
+ * An internet connection.
+ * That no special treatment is given to the supplied oonib test helper.
+
+For reporting to the backend to work that it is possible for the probe to
+establish a connection to the Tor network.
+
+# Expected impact
+
+ * Ability to determine that the transparent HTTP proxy is doing censorship
+ based on the HTTP Host header field.
+
+ * Ability to detect the presence of a Transparent HTTP Proxy
+
+ * Ability to detect which logic is being used by the Transparent proxy to
+ censor the target sites and if some circumvention strategies are effective.
+
+ * (optional) if the blockpage is specified if the hostname under analysis is
+ being blocked.
+
+# Expected inputs
+
+ * A list of hostnames to be tested
+
+ * The IP address (or hostname) of an oonib HTTPReturnJSONHeadersHelper test
+ helper running on port 80.
+
+ * (optional) the content of the blockpage to compare against when processing
+ the response.
+
+## Semantics
+
+One per line a list of hostnames, for example:
+
+ torproject.org
+ ooni.nu
+
+# Test description
+
+For every given hostname we perform the following series of tests. Once every
+test is completed we always perform a fixed set of operations to infer the
+presence of a transparent HTTP proxy and/or censorship.
+
+We take the response from our request and check to see if it starts with the
+character '{', if it does not we consider that a transparent HTTP proxy is
+present.
+
+If not we attempt to parse the response as a JSON string, if it does not parse
+we consider a that a transparent HTTP proxy is present.
+
+If the JSON string does parse we look for the following dict keys:
+
+ * 'request_headers'
+
+ * 'request_line'
+
+ * 'headers_dict'
+
+If all of them are present we consider that no transparent HTTP proxy is
+present.
+
+If a transparent HTTP proxy is present and the user has specified the content
+of the censorship blockpage we compare the response with the known blockpage
+and check if they match. If they do match then the hostname is maked as
+censored.
+
+These operations are done once for every one of the following tests:
+
+## test_send_host_header
+
+We connect to the backend test helper on port 80 and perform a HTTP GET request
+with the Host header field set to the target hostname.
+
+## test_filtering_via_fuzzy_matching
+
+The Host header field contains the hostname prefixed by 10 random characters
+and postfixed by 10 random characters.
+
+The purpose of this is to determine if censorship is being triggerred by fuzzy
+matching.
+
+## test_filtering_of_subdomain
+
+The Host header field contains a random 10 character subdomain of the target
+hostname (`ninechars1.example.com`).
+
+The purpose of this is to determine if also subdomains are being censored.
+
+
+## test_filtering_add_tab_to_host
+
+The Host header field contains the subdomain postfixed by the tab character
+`\t`.
+
+The purpose of this is to determine if by appending a tab character the filter
+is being bypassed.
+
+## test_filtering_prepend_newline_to_method
+
+The HTTP Request Line is prefixed with a newline character `\n`.
+
+The purpose of this is to determine if this is a valid filter bypassing
+strategy.
+
+XXX move this to a separate test as it does not have much to do with the HTTP
+Host field.
+
+# Expected output
+
+## Parent data format
+
+df-001-httpt
+
+## Semantics
+
+'filtering_via_fuzzy_matching': true|false|null
+'filtering_prepend_newline_to_method': true|false|null
+'filtering_add_tab_to_host': true|false|null
+'filtering_of_subdomain': true|false|null
+
+ If the site supplied as input can be reached by using the evasion technique
+ this is set to false.
+
+ If the content of the blockpage is specified we make an evaluation of
+ censorship or not based on the response matching it or not.
+
+ If the response contains the expect JSON dict returned from the oonib test
+ helper then we consider censorship to not be happening ('censorship': False).
+
+ In all other cases 'censorship' is set to null.
+
+'transparent_http_proxy': true|false
+
+ if we have detected the presence of a transparent HTTP proxy or not.
+
+## Possible conclusions
+
+We can say that a certain site is blocked or not and looking at the result we
+can understand which censorship bypassing strategies have worked and therefore
+understand which censorship device the one being analyzed may be.
+## Example output sample
+
+```
+###########################################
+# OONI Probe Report for http_host (0.2.4)
+# Fri Jan 10 14:27:41 2014
+###########################################
+---
+input_hashes: [82c5cebe7a7cced3aad75e304b6e84b8ec97f808db835b7d641f7612216624f9]
+options: [-f, example_inputs/alexa-head.txt]
+probe_asn: AS3269
+probe_cc: IT
+probe_city: Formia
+probe_ip: 127.0.0.1
+software_name: ooniprobe
+software_version: 1.0.0-rc5
+start_time: 1389360461.066207
+test_name: http_host
+test_version: 0.2.4
+...
+---
+agent: agent
+filtering_add_tab_to_host: false
+filtering_of_subdomain: false
+filtering_prepend_newline_to_method: false
+filtering_via_fuzzy_matching: false
+input: google.com
+requests:
+- request:
+ body: null
+ headers:
+ - - Host
+ - [MQEEayVEc3google.comVjAZPi29bT]
+ method: GET
+ tor: false
+ url: http://93.95.227.200
+ response:
+ body: '{"headers_dict": {"Connection": ["close"], "Host": ["MQEEayVEc3google.comVjAZPi29bT"]},
+ "request_line": "GET / HTTP/1.1", "request_headers": [["Connection", "close"],
+ ["Host", "MQEEayVEc3google.comVjAZPi29bT"]]}'
+ code: 200
+ headers: []
+- request:
+ body: null
+ headers:
+ - - Host
+ - ["google.com\t"]
+ method: GET
+ tor: false
+ url: http://93.95.227.200
+ response:
+ body: '{"headers_dict": {"Connection": ["close"], "Host": ["google.com"]}, "request_line":
+ "GET / HTTP/1.1", "request_headers": [["Connection", "close"], ["Host", "google.com"]]}'
+ code: 200
+ headers: []
+- request:
+ body: null
+ headers:
+ - - Host
+ - [google.com]
+ method: '
+
+ GET'
+ tor: false
+ url: http://93.95.227.200
+ response:
+ body: '{"headers_dict": {"Connection": ["close"], "Host": ["google.com"]}, "request_line":
+ "\nGET / HTTP/1.1", "request_headers": [["Connection", "close"], ["Host", "google.com"]]}'
+ code: 200
+ headers: []
+- request:
+ body: null
+ headers:
+ - - Host
+ - [google.com]
+ method: GET
+ tor: false
+ url: http://93.95.227.200
+ response:
+ body: '{"headers_dict": {"Connection": ["close"], "Host": ["google.com"]}, "request_line":
+ "GET / HTTP/1.1", "request_headers": [["Connection", "close"], ["Host", "google.com"]]}'
+ code: 200
+ headers: []
+- request:
+ body: null
+ headers:
+ - - Host
+ - [36YQ5NpXV6.google.com]
+ method: GET
+ tor: false
+ url: http://93.95.227.200
+ response:
+ body: '{"headers_dict": {"Connection": ["close"], "Host": ["36YQ5NpXV6.google.com"]},
+ "request_line": "GET / HTTP/1.1", "request_headers": [["Connection", "close"],
+ ["Host", "36YQ5NpXV6.google.com"]]}'
+ code: 200
+ headers: []
+send_host_header: false
+socksproxy: null
+transparent_http_proxy: false
+...
+```
+
+# Privacy considerations
+
+If the user is behind a transparent HTTP proxy that sets the X-Forwarded-For
+header their IP address will end up being part of the final report.
diff --git a/test-specs/ts-004-httphost.md b/test-specs/ts-004-httphost.md
deleted file mode 100644
index 6ce8030..0000000
--- a/test-specs/ts-004-httphost.md
+++ /dev/null
@@ -1,257 +0,0 @@
-# Specification version number
-
-2013-02-26-000
-
-# Specification name
-
-HTTP Host test
-
-# Test preconditions
-
- * An internet connection.
- * That no special treatment is given to the supplied oonib test helper.
-
-For reporting to the backend to work that it is possible for the probe to
-establish a connection to the Tor network.
-
-# Expected impact
-
- * Ability to determine that the transparent HTTP proxy is doing censorship
- based on the HTTP Host header field.
-
- * Ability to detect the presence of a Transparent HTTP Proxy
-
- * Ability to detect which logic is being used by the Transparent proxy to
- censor the target sites and if some circumvention strategies are effective.
-
- * (optional) if the blockpage is specified if the hostname under analysis is
- being blocked.
-
-# Expected inputs
-
- * A list of hostnames to be tested
-
- * The IP address (or hostname) of an oonib HTTPReturnJSONHeadersHelper test
- helper running on port 80.
-
- * (optional) the content of the blockpage to compare against when processing
- the response.
-
-## Semantics
-
-One per line a list of hostnames, for example:
-
- torproject.org
- ooni.nu
-
-# Test description
-
-For every given hostname we perform the following series of tests. Once every
-test is completed we always perform a fixed set of operations to infer the
-presence of a transparent HTTP proxy and/or censorship.
-
-We take the response from our request and check to see if it starts with the
-character '{', if it does not we consider that a transparent HTTP proxy is
-present.
-
-If not we attempt to parse the response as a JSON string, if it does not parse
-we consider a that a transparent HTTP proxy is present.
-
-If the JSON string does parse we look for the following dict keys:
-
- * 'request_headers'
-
- * 'request_line'
-
- * 'headers_dict'
-
-If all of them are present we consider that no transparent HTTP proxy is
-present.
-
-If a transparent HTTP proxy is present and the user has specified the content
-of the censorship blockpage we compare the response with the known blockpage
-and check if they match. If they do match then the hostname is maked as
-censored.
-
-These operations are done once for every one of the following tests:
-
-## test_send_host_header
-
-We connect to the backend test helper on port 80 and perform a HTTP GET request
-with the Host header field set to the target hostname.
-
-## test_filtering_via_fuzzy_matching
-
-The Host header field contains the hostname prefixed by 10 random characters
-and postfixed by 10 random characters.
-
-The purpose of this is to determine if censorship is being triggerred by fuzzy
-matching.
-
-## test_filtering_of_subdomain
-
-The Host header field contains a random 10 character subdomain of the target
-hostname (`ninechars1.example.com`).
-
-The purpose of this is to determine if also subdomains are being censored.
-
-
-## test_filtering_add_tab_to_host
-
-The Host header field contains the subdomain postfixed by the tab character
-`\t`.
-
-The purpose of this is to determine if by appending a tab character the filter
-is being bypassed.
-
-## test_filtering_prepend_newline_to_method
-
-The HTTP Request Line is prefixed with a newline character `\n`.
-
-The purpose of this is to determine if this is a valid filter bypassing
-strategy.
-
-XXX move this to a separate test as it does not have much to do with the HTTP
-Host field.
-
-# Expected output
-
-## Parent data format
-
-df-001-httpt
-
-## Semantics
-
-'filtering_via_fuzzy_matching': true|false|null
-'filtering_prepend_newline_to_method': true|false|null
-'filtering_add_tab_to_host': true|false|null
-'filtering_of_subdomain': true|false|null
-
- If the site supplied as input can be reached by using the evasion technique
- this is set to false.
-
- If the content of the blockpage is specified we make an evaluation of
- censorship or not based on the response matching it or not.
-
- If the response contains the expect JSON dict returned from the oonib test
- helper then we consider censorship to not be happening ('censorship': False).
-
- In all other cases 'censorship' is set to null.
-
-'transparent_http_proxy': true|false
-
- if we have detected the presence of a transparent HTTP proxy or not.
-
-## Possible conclusions
-
-We can say that a certain site is blocked or not and looking at the result we
-can understand which censorship bypassing strategies have worked and therefore
-understand which censorship device the one being analyzed may be.
-## Example output sample
-
-```
-###########################################
-# OONI Probe Report for http_host (0.2.4)
-# Fri Jan 10 14:27:41 2014
-###########################################
----
-input_hashes: [82c5cebe7a7cced3aad75e304b6e84b8ec97f808db835b7d641f7612216624f9]
-options: [-f, example_inputs/alexa-head.txt]
-probe_asn: AS3269
-probe_cc: IT
-probe_city: Formia
-probe_ip: 127.0.0.1
-software_name: ooniprobe
-software_version: 1.0.0-rc5
-start_time: 1389360461.066207
-test_name: http_host
-test_version: 0.2.4
-...
----
-agent: agent
-filtering_add_tab_to_host: false
-filtering_of_subdomain: false
-filtering_prepend_newline_to_method: false
-filtering_via_fuzzy_matching: false
-input: google.com
-requests:
-- request:
- body: null
- headers:
- - - Host
- - [MQEEayVEc3google.comVjAZPi29bT]
- method: GET
- tor: false
- url: http://93.95.227.200
- response:
- body: '{"headers_dict": {"Connection": ["close"], "Host": ["MQEEayVEc3google.comVjAZPi29bT"]},
- "request_line": "GET / HTTP/1.1", "request_headers": [["Connection", "close"],
- ["Host", "MQEEayVEc3google.comVjAZPi29bT"]]}'
- code: 200
- headers: []
-- request:
- body: null
- headers:
- - - Host
- - ["google.com\t"]
- method: GET
- tor: false
- url: http://93.95.227.200
- response:
- body: '{"headers_dict": {"Connection": ["close"], "Host": ["google.com"]}, "request_line":
- "GET / HTTP/1.1", "request_headers": [["Connection", "close"], ["Host", "google.com"]]}'
- code: 200
- headers: []
-- request:
- body: null
- headers:
- - - Host
- - [google.com]
- method: '
-
- GET'
- tor: false
- url: http://93.95.227.200
- response:
- body: '{"headers_dict": {"Connection": ["close"], "Host": ["google.com"]}, "request_line":
- "\nGET / HTTP/1.1", "request_headers": [["Connection", "close"], ["Host", "google.com"]]}'
- code: 200
- headers: []
-- request:
- body: null
- headers:
- - - Host
- - [google.com]
- method: GET
- tor: false
- url: http://93.95.227.200
- response:
- body: '{"headers_dict": {"Connection": ["close"], "Host": ["google.com"]}, "request_line":
- "GET / HTTP/1.1", "request_headers": [["Connection", "close"], ["Host", "google.com"]]}'
- code: 200
- headers: []
-- request:
- body: null
- headers:
- - - Host
- - [36YQ5NpXV6.google.com]
- method: GET
- tor: false
- url: http://93.95.227.200
- response:
- body: '{"headers_dict": {"Connection": ["close"], "Host": ["36YQ5NpXV6.google.com"]},
- "request_line": "GET / HTTP/1.1", "request_headers": [["Connection", "close"],
- ["Host", "36YQ5NpXV6.google.com"]]}'
- code: 200
- headers: []
-send_host_header: false
-socksproxy: null
-transparent_http_proxy: false
-...
-```
-
-# Privacy considerations
-
-If the user is behind a transparent HTTP proxy that sets the X-Forwarded-For
-header their IP address will end up being part of the final report.
-
diff --git a/test-specs/ts-005-dns-spoof.md b/test-specs/ts-005-dns-spoof.md
new file mode 100644
index 0000000..3c542d0
--- /dev/null
+++ b/test-specs/ts-005-dns-spoof.md
@@ -0,0 +1,149 @@
+# Specification version number
+
+2013-9-10-000
+
+# Specification name
+
+DNS Spoof Test
+
+# Test preconditions
+
+ * An Internet connection.
+
+ * A DNS resolver to test against.
+
+ * A Hostname to resolve and check for tampering.
+
+# Expected impact
+
+ * The ability to detect spoofed DNS responses.
+
+# Expected inputs
+
+This test expects the following arguments:
+
+ * The address and port of the resolver to test.
+
+ * The hostname to be resolved.
+
+## Semantics
+
+The resolver to test is passed by argument (-r) with ADDRESS:PORT convention.
+A known good backend resolver may also be passed by argument (-b) with the
+same convention. The default known good backend resolver is Google DNS
+(8.8.8.8:53).
+
+The hostname to test is passed by argument (-h) as a FQDN, e.g.
+www.google.com
+
+# Test Description
+
+We perform an A DNS query (via UDP) to the control resolver. The answer to
+such query is called the control answer.
+
+We perform an A DNS query (via UDP) to the test resolver. We then compare
+this answer (experiment answer) with the control answer.
+
+If the DNS payload of the received packets matches identically, then spoofing
+is considered to be occurring.
+
+# Expected output
+
+The output report will contain a boolean entry 'spoofing'. If spoofing is
+occurring, it shall be True. Otherwise, it is False.
+
+## Parent data format
+
+df-001-scapyt-000
+
+## Required output data
+
+ * Whether or not the DNS payload matches (spoofing).
+
+## Semantics
+
+In addition to the data specified in the parent data format, the following
+field(s) are added to the report:
+
+Version 0.0.1:
+
+ spoofing: true|false
+
+## Possible conclusions
+
+Whether or not DNS spoofing is occurring for a particular FQDN.
+
+## Example output sample
+
+
+ ###########################################
+ # OONI Probe Report for dns_spoof (0.0.1)
+ # Wed Sep 25 15:39:32 2013
+ ###########################################
+ ---
+ input_hashes: []
+ options: [-r, '10.211.0.10:53', -h, google.com]
+ probe_asn: AS2819
+ probe_cc: CZ
+ probe_ip: 127.0.0.1
+ software_name: ooniprobe
+ software_version: 1.0.0-rc3
+ start_time: 1380116372.573729
+ test_name: dns_spoof
+ test_version: 0.0.1
+ ...
+ ---
+ answer_flags: [ipsrc]
+ answered_packets:
+ - - raw_packet: !!binary |
+ RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
+ ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
+ AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
+ AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
+ summary: 'IP / UDP / DNS Ans "173.194.44.229" '
+ - - raw_packet: !!binary |
+ RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
+ ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
+ AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
+ AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
+ summary: 'IP / UDP / DNS Ans "173.194.44.231" '
+ input: null
+ sent_packets:
+ - - raw_packet: !!binary |
+ RQAAOAABAABAEeujfwAAAQgICAgANQA1ACRccgAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
+ summary: 'IP / UDP / DNS Qry "google.com" '
+ - - raw_packet: !!binary |
+ RQAAOAABAABAEfDWfwAAAQrTAAoANQA1ACRhpQAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
+ summary: 'IP / UDP / DNS Qry "google.com" '
+ spoofing: false
+ test_a_lookup:
+ answered_packets:
+ - raw_packet: !!binary |
+ RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
+ ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
+ AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
+ AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
+ summary: 'IP / UDP / DNS Ans "173.194.44.231" '
+ test_control_a_lookup:
+ answered_packets:
+ - raw_packet: !!binary |
+ RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
+ Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
+ ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
+ AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
+ AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
+ BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
+ summary: 'IP / UDP / DNS Ans "173.194.44.229" '
+ ...
+
+# Privacy considerations
+
+As this test inherits from the Scapy template (see the Parent data format),
+the same warnings apply. In particular, ICMP error messages may contain the
+non anonymized user IP address.
diff --git a/test-specs/ts-005-dnsspoof.md b/test-specs/ts-005-dnsspoof.md
deleted file mode 100644
index 3c542d0..0000000
--- a/test-specs/ts-005-dnsspoof.md
+++ /dev/null
@@ -1,149 +0,0 @@
-# Specification version number
-
-2013-9-10-000
-
-# Specification name
-
-DNS Spoof Test
-
-# Test preconditions
-
- * An Internet connection.
-
- * A DNS resolver to test against.
-
- * A Hostname to resolve and check for tampering.
-
-# Expected impact
-
- * The ability to detect spoofed DNS responses.
-
-# Expected inputs
-
-This test expects the following arguments:
-
- * The address and port of the resolver to test.
-
- * The hostname to be resolved.
-
-## Semantics
-
-The resolver to test is passed by argument (-r) with ADDRESS:PORT convention.
-A known good backend resolver may also be passed by argument (-b) with the
-same convention. The default known good backend resolver is Google DNS
-(8.8.8.8:53).
-
-The hostname to test is passed by argument (-h) as a FQDN, e.g.
-www.google.com
-
-# Test Description
-
-We perform an A DNS query (via UDP) to the control resolver. The answer to
-such query is called the control answer.
-
-We perform an A DNS query (via UDP) to the test resolver. We then compare
-this answer (experiment answer) with the control answer.
-
-If the DNS payload of the received packets matches identically, then spoofing
-is considered to be occurring.
-
-# Expected output
-
-The output report will contain a boolean entry 'spoofing'. If spoofing is
-occurring, it shall be True. Otherwise, it is False.
-
-## Parent data format
-
-df-001-scapyt-000
-
-## Required output data
-
- * Whether or not the DNS payload matches (spoofing).
-
-## Semantics
-
-In addition to the data specified in the parent data format, the following
-field(s) are added to the report:
-
-Version 0.0.1:
-
- spoofing: true|false
-
-## Possible conclusions
-
-Whether or not DNS spoofing is occurring for a particular FQDN.
-
-## Example output sample
-
-
- ###########################################
- # OONI Probe Report for dns_spoof (0.0.1)
- # Wed Sep 25 15:39:32 2013
- ###########################################
- ---
- input_hashes: []
- options: [-r, '10.211.0.10:53', -h, google.com]
- probe_asn: AS2819
- probe_cc: CZ
- probe_ip: 127.0.0.1
- software_name: ooniprobe
- software_version: 1.0.0-rc3
- start_time: 1380116372.573729
- test_name: dns_spoof
- test_version: 0.0.1
- ...
- ---
- answer_flags: [ipsrc]
- answered_packets:
- - - raw_packet: !!binary |
- RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
- ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
- AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
- AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
- summary: 'IP / UDP / DNS Ans "173.194.44.229" '
- - - raw_packet: !!binary |
- RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
- ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
- AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
- AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
- summary: 'IP / UDP / DNS Ans "173.194.44.231" '
- input: null
- sent_packets:
- - - raw_packet: !!binary |
- RQAAOAABAABAEeujfwAAAQgICAgANQA1ACRccgAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
- summary: 'IP / UDP / DNS Qry "google.com" '
- - - raw_packet: !!binary |
- RQAAOAABAABAEfDWfwAAAQrTAAoANQA1ACRhpQAAAQAAAQAAAAAAAAZnb29nbGUDY29tAAABAAE=
- summary: 'IP / UDP / DNS Qry "google.com" '
- spoofing: false
- test_a_lookup:
- answered_packets:
- - raw_packet: !!binary |
- RbgA6J0DAABAEdQUCtMACn8AAAEANQA1ANSxxAAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5wZnb29nbGUDY29tAAABAAEAAADfAAStwizoBmdvb2ds
- ZQNjb20AAAEAAQAAAN8ABK3CLOkGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs5gZnb29nbGUDY29t
- AAABAAEAAADfAAStwizkBmdvb2dsZQNjb20AAAEAAQAAAN8ABK3CLOUGZ29vZ2xlA2NvbQAAAQAB
- AAAA3wAErcIs7gZnb29nbGUDY29tAAABAAEAAADfAAStwizhBmdvb2dsZQNjb20AAAEAAQAAAN8A
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA3wAErcIs4wZnb29nbGUDY29tAAABAAEAAADfAAStwizi
- summary: 'IP / UDP / DNS Ans "173.194.44.231" '
- test_control_a_lookup:
- answered_packets:
- - raw_packet: !!binary |
- RbgA6OumAAAyEY4+CAgICH8AAAEANQA1ANSshgAAgYAAAQALAAAAAAZnb29nbGUDY29tAAABAAEG
- Z29vZ2xlA2NvbQAAAQABAAAA4AAErcIs5QZnb29nbGUDY29tAAABAAEAAADgAAStwizkBmdvb2ds
- ZQNjb20AAAEAAQAAAOAABK3CLOYGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs6QZnb29nbGUDY29t
- AAABAAEAAADgAAStwizoBmdvb2dsZQNjb20AAAEAAQAAAOAABK3CLOcGZ29vZ2xlA2NvbQAAAQAB
- AAAA4AAErcIs4gZnb29nbGUDY29tAAABAAEAAADgAAStwizjBmdvb2dsZQNjb20AAAEAAQAAAOAA
- BK3CLOAGZ29vZ2xlA2NvbQAAAQABAAAA4AAErcIs4QZnb29nbGUDY29tAAABAAEAAADgAAStwizu
- summary: 'IP / UDP / DNS Ans "173.194.44.229" '
- ...
-
-# Privacy considerations
-
-As this test inherits from the Scapy template (see the Parent data format),
-the same warnings apply. In particular, ICMP error messages may contain the
-non anonymized user IP address.
diff --git a/test-specs/ts-008-tcp-connect.md b/test-specs/ts-008-tcp-connect.md
new file mode 100644
index 0000000..e5bd000
--- /dev/null
+++ b/test-specs/ts-008-tcp-connect.md
@@ -0,0 +1,98 @@
+# Specification version number
+
+2013-10-08-000
+
+# Specification name
+
+TCP Connect Test
+
+# Test preconditions
+
+ * An internet connection
+
+For reporting to the backend to work that it is possible for
+the probe to establish a connection to the Tor network.
+
+# Expected impact
+
+Ability to determine if a TCP connection can be successfully established.
+
+# Expected inputs
+
+## Import document or import data format
+
+A list of URLs to be tested for censorship.
+
+## Data specification version number
+
+## Semantics
+
+The input document may contain an http or https URL, an IP:PORT, or a FQDN:PORT per line. e.g.
+
+```
+ http://www.google.com
+ google.com:80
+ 8.8.8.8:53
+```
+
+are all valid entries
+
+# Test description
+
+For every item given as input we perform a TCP connect. If
+the connection is succesful, we record 'success' for the
+test. If the connection fails, we record the reason for the
+failure.
+
+# Expected output
+
+The key 'connection' is added to the report. One report entry is written per line in the input document.
+
+## Required output data
+
+The result of the connection attempt, 'success' or failure type.
+
+## Semantics
+
+'success' or a string indicating the reason for the failure.
+
+## Possible conclusions
+
+Ability to determine that a specific host:port is blocked.
+
+## Example output sample
+```
+ ###########################################
+ # OONI Probe Report for tcp_connect (0.1)
+ # Wed Sep 18 20:41:49 2013
+ ###########################################
+ ---
+ input_hashes: [e0611ecd28bead38a7afeb4dda8ae3449d0fc2e1ba53fa7355f2799dce9af290]
+ options: [-f, /home/ooni/.ooni/inputs/alexa-top-1m.txt]
+ probe_asn: AS1234
+ probe_cc: US
+ probe_ip: 127.0.0.1
+ software_name: ooniprobe
+ software_version: 1.0.0-rc3
+ start_time: 1379536909.514028
+ test_name: tcp_connect
+ test_version: '0.1'
+ ...
+ ---
+ {connection: success, input: 'google.com:80'}
+ ...
+ ---
+ {connection: success, input: 'youtube.com:80'}
+ ...
+ ---
+ {connection: success, input: 'google.com.hk:80'}
+ ...
+ ---
+ {connection: success, input: 'google.de:80'}
+ ...
+ ---
+ {connection: success, input: 'google.co.in:80'}
+ ...
+ ---
+ {connection: success, input: 'blogspot.com:80'}
+ ```
diff --git a/test-specs/ts-008-tcpconnect.md b/test-specs/ts-008-tcpconnect.md
deleted file mode 100644
index 0736cc4..0000000
--- a/test-specs/ts-008-tcpconnect.md
+++ /dev/null
@@ -1,98 +0,0 @@
-# Specification version number
-
-2013-10-08-000
-
-# Specification name
-
-TCP Connect Test
-
-# Test preconditions
-
- * An internet connection
-
-For reporting to the backend to work that it is possible for
-the probe to establish a connection to the Tor network.
-
-# Expected impact
-
-Ability to determine if a TCP connection can be successfully established.
-
-# Expected inputs
-
-## Import document or import data format
-
-A list of URLs to be tested for censorship.
-
-## Data specification version number
-
-## Semantics
-
-The input document may contain an http or https URL, an IP:PORT, or a FQDN:PORT per line. e.g.
-
-```
- http://www.google.com
- google.com:80
- 8.8.8.8:53
-```
-
-are all valid entries
-
-# Test description
-
-For every item given as input we perform a TCP connect. If
-the connection is succesful, we record 'success' for the
-test. If the connection fails, we record the reason for the
-failure.
-
-# Expected output
-
-The key 'connection' is added to the report. One report entry is written per line in the input document.
-
-## Required output data
-
-The result of the connection attempt, 'success' or failure type.
-
-## Semantics
-
-'success' or a string indicating the reason for the failure.
-
-## Possible conclusions
-
-Ability to determine that a specific host:port is blocked.
-
-## Example output sample
-```
- ###########################################
- # OONI Probe Report for tcp_connect (0.1)
- # Wed Sep 18 20:41:49 2013
- ###########################################
- ---
- input_hashes: [e0611ecd28bead38a7afeb4dda8ae3449d0fc2e1ba53fa7355f2799dce9af290]
- options: [-f, /home/ooni/.ooni/inputs/alexa-top-1m.txt]
- probe_asn: AS1234
- probe_cc: US
- probe_ip: 127.0.0.1
- software_name: ooniprobe
- software_version: 1.0.0-rc3
- start_time: 1379536909.514028
- test_name: tcp_connect
- test_version: '0.1'
- ...
- ---
- {connection: success, input: 'google.com:80'}
- ...
- ---
- {connection: success, input: 'youtube.com:80'}
- ...
- ---
- {connection: success, input: 'google.com.hk:80'}
- ...
- ---
- {connection: success, input: 'google.de:80'}
- ...
- ---
- {connection: success, input: 'google.co.in:80'}
- ...
- ---
- {connection: success, input: 'blogspot.com:80'}
- ```
diff --git a/test-specs/ts-009-multi-port-traceroute.md b/test-specs/ts-009-multi-port-traceroute.md
deleted file mode 100644
index ca0bff2..0000000
--- a/test-specs/ts-009-multi-port-traceroute.md
+++ /dev/null
@@ -1,2384 +0,0 @@
-# Specification version number
-
-2013-10-07-000
-
-# Specification name
-
-Multi Port Traceroute test
-
-# Test preconditions
-
- * An internet connection.
- * Ability to run ooni-probe as root or with raw sockets capabilities
-
-For reporting to the backend to work that it is possible for the probe to
-establish a connection to the Tor network.
-
-# Expected impact
-
- * Ability to determine differences in network paths of
- different protocols and ports
-
-
-# Expected inputs
-
- * No additional inputs are required as the destination host
- (backend) defaults to 8.8.8.8. The backend can optionally
- be specified with argument -b.
-
- * Additional parameters such as source port, maximum TTL,
- and timeout values can also be set
-
-
-## Semantics
-
- * The backend host is specified as a dotted-quad IPv4
- address.
-
- * Maximum TTL defaults to 30.
-
-# Test description
-
-A series of packets are constructed and sent to the backend
-host with incrementing TTL values (traceroute).
-
-See also: https://tools.ietf.org/rfc/rfc792.txt
-
-For protocols UDP and TCP, a traceroute is performed for each
-of the following ports: 0, 22, 23, 53, 80, 123, 443, 8080,
-65535.
-
-For protocol ICMP, there is only a single series of packets
-as there is no concept of ports.
-
-The time-exceeded ICMP responses are added to the report.
-
-# Expected output
-
-The collected ICMP time-exceeded responses from IP routers
-that properly implement RFC792 in the forward path towards
-the backend host.
-
-## Parent data format
-
-df-003-scapyt
-
-## Semantics
-
-The report object will contain keys of the format "hops_" +
-port, e.g. report['hops_22']. The corresponding value is an
-ordered list of the parsed responses, encoded like so:
-
-{'ttl': The TTL of the packet sent,
- 'address', The address of the remote host at which the TTL expired,
- 'rtt', the round-trip-time, measured as the difference between the received response and sent packet time.
- 'sport', the source port of the sent packet
-}
-
-## Possible conclusions
-
-By examining the differences in the responses between protocols and destination ports, it is possible to ascertain that routing decisions are made on a protocol layer above IP, and determine what path was taken for different protocols.
-
-## Example output sample
-
-```
-###########################################
-# OONI Probe Report for multi_protocol_traceroute_test (0.2)
-# Thu Jan 2 16:54:10 2014
-###########################################
----
-input_hashes: []
-options: [-b, 8.8.8.8]
-probe_asn: AS0
-probe_cc: null
-probe_city: null
-probe_ip: 127.0.0.1
-software_name: ooniprobe
-software_version: 1.0.0-rc5
-start_time: 1388678050.83065
-test_name: multi_protocol_traceroute_test
-test_version: '0.2'
-...
----
-answer_flags: [ipsrc]
-answered_packets:
-- - raw_packet: !!binary |
- RQAAOIKHAAD/ASMzCgABAX8AAAELAHHxAAAAAEUAAChcPgAAAQZCeQoAAQoICAgIgw4AAAAAAAAA
- AAAAUAIgAPG6AAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOEGbAAD9AX7ECgHnmn8AAAELAHHxAAAAAEUAACgm8wAAAQZ3xAoAAQoICAgIgw4AAAAAAAAA
- AAAAUAIgAPG6AAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOF4UAAD8AagiCvuhyX8AAAELAHHxAAAAAEUAACgexAAAAQZ/8woAAQoICAgIgw4AAAAAAAAA
- AAAAUAIgAPG6AAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOAMQAAD7AQnWCvucGn8AAAELAHHxAAAAAEUAACg0uwAAAQZp/AoAAQoICAgIgw4AAAAAAAAA
- AAAAUAIgAPG6AAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAODxjAAD8Ac6bCvudAX8AAAELAHHxAAAAAEUAACgBwgAAAQac9QoAAQoICAgIgw4AAAAAAAAA
- AAAAUAIgAPG6AAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOIKJAAD/ASMxCgABAX8AAAELAOD/AAAAAEUAAChUkAAAAQZKJwoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOBVxAAB+ASIBCkjwAX8AAAELAOD/AAAAAEUAACgibwAAAQZ8SAoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOHJKAAD9AU4VCgHnmn8AAAELAOD/AAAAAEUAACglXAAAAQZ5WwoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOGivAAD8AZ2HCvuhyX8AAAELAOD/AAAAAEUAACh9egAAAQYhPQoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOGGbAAD7AatKCvucGn8AAAELAOD/AAAAAEUAACgQJAAAAQaOkwoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOBn4AAD8AfEGCvudAX8AAAELAOD/AAAAAEUAACgovgAAAQZ1+QoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOGuHAAD7AcAnCvd9VX8AAAELAOD/AAAAAEUAACgoPQAAAQZ2egoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOEMPAAD6AcXuCvuhwn8AAAELAOD/AAAAAEUAACgrYwAAAQZzVAoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOBCDAAD5AR/MCmd8BX8AAAELAOD/AAAAAEUAAChfGQAAAQY/ngoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOF1gAAD4AdAcCgGAPX8AAAELAOD/AAAAAEUAACgU/gAAAQaJuQoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOAFrAAD3AaEFCv4LTX8AAAELAOD/AAAAAEUAACguhwAAAQZwMAoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODuqAAD3AVtFWWHIan8AAAELAOD/AAAAAEUAACgqZAAAAQZ0UwoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYFCFAAD2AUauWWHI/n8AAAELAFI7AAAAAEUAACh3dQAAAQYnQgoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAB7CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOAy/AAD2AYsdWWDIfn8AAAELAOD/AAAAAEUAACgNDwAAAQaRqAoAAQoICAgIE+kAFwAAAAAA
- AAAAUAIgAGDJAAA=
- summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOIKLAAD/ASMvCgABAX8AAAELADZXAAAAAEUAACh24gAAAQYn1QoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOE7uAAD9AXFxCgHnmn8AAAELADZXAAAAAEUAACgSBQAAAQaMsgoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOELGAAB+AfSrCkjwAX8AAAELADZXAAAAAEUAACgzAQAAAQZrtgoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOE9IAAD8AbbuCvuhyX8AAAELADZXAAAAAEUAACgfbwAAAQZ/SAoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAODJHAAD7AdqeCvucGn8AAAELADZXAAAAAEUAAChw0gAAAQYt5QoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOHr8AAD8AZACCvudAX8AAAELADZXAAAAAEUAACgxTwAAAQZtaAoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOCZ6AAD7AQU1Cvd9VX8AAAELADZXAAAAAEUAACh6uwAAAQYj/AoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOBpqAAD6Ae6TCvuhwn8AAAELADZXAAAAAEUAACg6sgAAAQZkBQoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODEjAAD5Af8rCmd8BX8AAAELADZXAAAAAEUAACg8gwAAAQZiNAoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOFftAAD4AdWPCgGAPX8AAAELADZXAAAAAEUAACgq7wAAAQZzyAoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOED1AAD3AWF7Cv4LTX8AAAELADZXAAAAAEUAACgo9QAAAQZ1wgoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODAMAAD3AWbjWWHIan8AAAELADZXAAAAAEUAAChHGgAAAQZXnQoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYEdUAAD2AU/fWWHI/n8AAAELAMoiAAAAAEUAACgWnQAAAQaIGgoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgAPwxAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOBb+AAD2AYDeWWDIfn8AAAELADZXAAAAAEUAACgR7AAAAQaMywoAAQoICAgIvlgAUAAAAAAA
- AAAAUAIgALYgAAA=
- summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOIKNAAD/ASMtCgABAX8AAAELAPmyAAAAAEUAACgRygAAAQaM7QoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOHk7AAD9AUckCgHnmn8AAAELAPmyAAAAAEUAACgZHQAAAQaFmgoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOHkEAAD8AY0yCvuhyX8AAAELAPmyAAAAAEUAAChagAAAAQZENwoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOEb4AAD7AcXtCvucGn8AAAELAPmyAAAAAEUAAChHjAAAAQZXKwoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOEeRAAD8AcNtCvudAX8AAAELAPmyAAAAAEUAAChcWwAAAQZCXAoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOFxtAAD7Ac9BCvd9VX8AAAELAPmyAAAAAEUAAChMHAAAAQZSmwoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODriAAD6Ac4bCvuhwn8AAAELAPmyAAAAAEUAACgmkQAAAQZ4JgoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOF6XAAD5AdG3Cmd8BX8AAAELAPmyAAAAAEUAACgk9gAAAQZ5wQoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOCwQAAD4AQFtCgGAPX8AAAELAPmyAAAAAEUAACh8tQAAAQYiAgoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOB0EAAD3AYVsCv4LTX8AAAELAPmyAAAAAEUAACh6oAAAAQYkFwoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOFVxAAD3AUF+WWHIan8AAAELAPmyAAAAAEUAACggTwAAAQZ+aAoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYDJ8AAD2AWS3WWHI/n8AAAELAGzNAAAAAEUAAChJIAAAAQZVlwoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgABzjAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAODLbAAD2AWT5WWDIhn8AAAELAPmyAAAAAEUAACgucgAAAQZwRQoAAQoICAgI+ZEBuwAAAAAA
- AAAAUAIgAHl8AAA=
- summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOIKPAAD/ASMrCgABAX8AAAELAGNSAAAAAEUAACg0TAAAAQZqawoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOEk/AAB+Ae4yCkjwAX8AAAELAGNSAAAAAEUAACgF/gAAAQaYuQoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOCihAAD9AZe+CgHnmn8AAAELAGNSAAAAAEUAACh8wgAAAQYh9QoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOH04AAD8AYj+CvuhyX8AAAELAGNSAAAAAEUAACg/7AAAAQZeywoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOGM+AAD7AamnCvucGn8AAAELAGNSAAAAAEUAAChmCwAAAQY4rAoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOApTAAD8AQCsCvudAX8AAAELAGNSAAAAAEUAAChHmQAAAQZXHgoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOBtSAAD7ARBdCvd9VX8AAAELAGNSAAAAAEUAACg1mAAAAQZpHwoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOHiXAAD6AZBmCvuhwn8AAAELAGNSAAAAAEUAAChv9gAAAQYuwQoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOGffAAD5AchvCmd8BX8AAAELAGNSAAAAAEUAAChZJQAAAQZFkgoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOCw9AAD4AQFACgGAPX8AAAELAGNSAAAAAEUAACh3CwAAAQYnrAoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOG8GAAD3ATNqCv4LTX8AAAELAGNSAAAAAEUAACgZRwAAAQaFcAoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOEBhAAD3AVaOWWHIan8AAAELAGNSAAAAAEUAACg5lAAAAQZlIwoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYDcVAAD2AWAeWWHI/n8AAAELAPvAAAAAAEUAACgjogAAAQZ7FQoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAPeOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOEneAAD2AU32WWDIhn8AAAELAGNSAAAAAEUAACgprwAAAQZ1CAoAAQoICAgIka3//wAAAAAA
- AAAAUAIgAOMbAAA=
- summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOIKIAAD/ASMyCgABAX8AAAELAHmgAAAAAEUAACiAgwAAAQYeNAoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODfVAAB+Af+cCkjwAX8AAAELAHmgAAAAAEUAAChPqAAAAQZPDwoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOAmvAAD9AbawCgHnmn8AAAELAHmgAAAAAEUAACgtrAAAAQZxCwoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOD0PAAD8AcknCvuhyX8AAAELAHmgAAAAAEUAAChHnAAAAQZXGwoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOArmAAD7AQIACvucGn8AAAELAHmgAAAAAEUAACh0ogAAAQYqFQoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAODC1AAD8AdpJCvudAX8AAAELAHmgAAAAAEUAAChQfAAAAQZOOwoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOAfoAAD7ASPHCvd9VX8AAAELAHmgAAAAAEUAAChSwQAAAQZL9goAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOEPGAAD6AcU3Cvuhwn8AAAELAHmgAAAAAEUAACg4kQAAAQZmJgoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOGK6AAD5Ac2UCmd8BX8AAAELAHmgAAAAAEUAACg8jwAAAQZiKAoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOC8sAAD4Af5QCgGAPX8AAAELAHmgAAAAAEUAACh6rgAAAQYkCQoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODMkAAD3AW9MCv4LTX8AAAELAHmgAAAAAEUAACg9EgAAAQZhpQoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOHHtAAD3ASUCWWHIan8AAAELAHmgAAAAAEUAAChrqQAAAQYzDgoAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYCipAAD2AW6KWWHI/n8AAAELAPcOAAAAAEUAACh+yQAAAQYf7goAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgABKPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOD/VAAD2AVf/WWDIhn8AAAELAHmgAAAAAEUAACgS3QAAAQaL2goAAQoICAgIe0kAFgAAAAAA
- AAAAUAIgAPlpAAA=
- summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOIKMAAD/ASMuCgABAX8AAAELAMqbAAAAAEUAAChzvgAAAQYq+QoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOADVAAB+ATadCkjwAX8AAAELAMqbAAAAAEUAACg27QAAAQZnygoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOBqVAAD9AaXKCgHnmn8AAAELAMqbAAAAAEUAACgbXgAAAQaDWQoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOEMTAAD8AcMjCvuhyX8AAAELAMqbAAAAAEUAAChdAwAAAQZBtAoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOBsqAAD7AfG7CvucGn8AAAELAMqbAAAAAEUAACh8VgAAAQYiYQoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOH3pAAD8AY0VCvudAX8AAAELAMqbAAAAAEUAACgIXwAAAQaWWAoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOE5BAAD7Ad1tCvd9VX8AAAELAMqbAAAAAEUAACheCQAAAQZArgoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOBdKAAD6AfGzCvuhwn8AAAELAMqbAAAAAEUAACgQywAAAQaN7AoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOGsMAAD5AcVCCmd8BX8AAAELAMqbAAAAAEUAACgcCwAAAQaCrAoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOBhtAAD4ARUQCgGAPX8AAAELAMqbAAAAAEUAAChCKQAAAQZcjgoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODzTAAD3AWWdCv4LTX8AAAELAMqbAAAAAEUAACgQXQAAAQaOWgoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOBI6AAD3AYS1WWHIan8AAAELAMqbAAAAAEUAACgkEAAAAQZ6pwoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOC3zAAD2AdEhPmV8QX8AAAELAMqbAAAAAEUAACgWyAAAAQaH7woAAQoICAgIKekAewAAAAAA
- AAAAUAIgAEplAAA=
- summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYGwiAAD2ASsRWWHI/n8AAAELAGD1AAAAAEUAACg3JwAAAQZnkAoAAQoICAgIKekAewAAAAAA
- AAAAUAIgAPmjAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOIKKAAD/ASMwCgABAX8AAAELANu1AAAAAEUAACi67wAAAQbjxwoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAODcjAAB+AQBPCkjwAX8AAAELANu1AAAAAEUAAChmjAAAAQY4KwoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOH8HAAD9AUFYCgHnmn8AAAELANu1AAAAAEUAACh5vwAAAQYk+AoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAODnqAAD8AcxMCvuhyX8AAAELANu1AAAAAEUAACgwaAAAAQZuTwoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAODG7AAD7AdsqCvucGn8AAAELANu1AAAAAEUAACgh4wAAAQZ81AoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOE65AAD8AbxFCvudAX8AAAELANu1AAAAAEUAACg+wwAAAQZf9AoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOFdRAAD7AdRdCvd9VX8AAAELANu1AAAAAEUAAChRbgAAAQZNSQoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOD3hAAD6AcscCvuhwn8AAAELANu1AAAAAEUAAChddAAAAQZBQwoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOF/GAAD5AdCICmd8BX8AAAELANu1AAAAAEUAACgOyQAAAQaP7goAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOE1DAAD4AeA5CgGAPX8AAAELANu1AAAAAEUAACgH0QAAAQaW5goAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOB+5AAD3AYK3Cv4LTX8AAAELANu1AAAAAEUAAChzbQAAAQYrSgoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOG1UAAD3ASmbWWHIan8AAAELANu1AAAAAEUAAChLowAAAQZTFAoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYBk2AAD2AX39WWHI/n8AAAELAE2eAAAAAEUAACgftQAAAQZ/AgoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAB4VAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOGuvAAD2ASx9WWDILn8AAAELANu1AAAAAEUAAChiigAAAQY8LQoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 89.96.200.46 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOCEtAAD0AX8mSA7TWX8AAAELANu1AAAAAEUAAChfEgAAAQY/pQoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 72.14.211.89 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOAUmAAD1AfLi0VXxXH8AAAELANu1AAAAAEWAACh3ggAAAQYmtQoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 209.85.241.92 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAqFe+AADwATcwSA7oTn8AAAELAE2eAAAAAEWAACh7bAAAAQYiywoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAB4VAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAC68AAIAQF7BKkB
- summary: IP / ICMP 72.14.232.78 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOEWeAAD0AaZU0VX+cn8AAAELANu1AAAAAEWAAChsnAAAAQYxmwoAAQoICAgIGRUANQAAAAAA
- AAAAUAIgAFt/AAA=
- summary: IP / ICMP 209.85.254.114 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAALHw7AAArBvh3CAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALCVxAAArBk9CCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALGaKAAArBg4pCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALDqzAAArBjoACAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALEoqAAArBiqJCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALAhaAAArBmxZCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALCwbAAArBkiYCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALBfiAAArBlzRCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALChYAAArBkxbCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALGkeAAArBguVCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAALF+pAAArBhUKCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
- summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
-- - raw_packet: !!binary |
- RQAAOIKOAAD/ASMsCgABAX8AAAELAPNSAAAAAEUAACjlPQAAAQa5eQoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOFrfAAD9AWWACgHnmn8AAAELAPNSAAAAAEUAACgEFAAAAQaaowoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOEvyAAD8AbpECvuhyX8AAAELAPNSAAAAAEUAACh2JwAAAQYokAoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOEoVAAD7AcLQCvucGn8AAAELAPNSAAAAAEUAAChWaQAAAQZITgoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOGOZAAD8AadlCvudAX8AAAELAPNSAAAAAEUAAChLfgAAAQZTOQoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RcAAOCkEAAD7AQKrCvd9VX8AAAELAPNSAAAAAEUAAChKTwAAAQZUaAoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOHL8AAD6AZYBCvuhwn8AAAELAPNSAAAAAEUAAChGKwAAAQZYjAoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOCBNAAD5ARACCmd8BX8AAAELAPNSAAAAAEUAACgaHwAAAQaEmAoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOF3sAAD4Ac+QCgGAPX8AAAELAPNSAAAAAEUAACgV/QAAAQaIugoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOCBhAAD3AYIPCv4LTX8AAAELAPNSAAAAAEUAAChuGQAAAQYwngoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOFcAAAD3AT/vWWHIan8AAAELAPNSAAAAAEUAACgTdQAAAQaLQgoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAYEpQAAD2AUzjWWHI/n8AAAELAJUsAAAAAEUAAChxMAAAAQYthwoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAO4jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror / Padding
-- - raw_packet: !!binary |
- RQAAOAxnAAD2AfKtPmV8QX8AAAELAPNSAAAAAEUAACgBDgAAAQadqQoAAQoICAgI4hwfkAAAAAAA
- AAAAUAIgAHMcAAA=
- summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / TCPerror
-- - raw_packet: !!binary |
- RQAAOIKRAAD/ASMpCgABAX8AAAELABAzAAAAAEUAABwvFgAAARFvogoAAQoICAgIqwYAFwAIOac=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFNsAAB+AeQFCkjwAX8AAAELAANFAAAAAEUAABw5ngAAARFlGgoAAQoICAgIqwYAFwAIRpU=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOHE6AAD9AU8lCgHnmn8AAAELAANFAAAAAEUAABxGtgAAARFYAgoAAQoICAgIqwYAFwAIRpU=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAODDfAAD8AdVXCvuhyX8AAAELAANFAAAAAEUAABxWXQAAARFIWwoAAQoICAgIqwYAFwAIRpU=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOHMbAAD7AZnKCvucGn8AAAELAANFAAAAAEUAABwFUAAAARGZaAoAAQoICAgIqwYAFwAIRpU=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOBQ5AAD8AfbFCvudAX8AAAELAANFAAAAAEUAABx9aQAAAREhTwoAAQoICAgIqwYAFwAIRpU=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOBMIAAD7ARinCvd9VX8AAAELANyRAAAAAEUAABwqfQAAARF0OwoAAQoICAgIqwYAFwAIbUg=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFPQAAD6AbUtCvuhwn8AAAELANyRAAAAAEUAABwGygAAARGX7goAAQoICAgIqwYAFwAIbUg=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOCzvAAD5AQNgCmd8BX8AAAELANyRAAAAAEUAABwnsAAAARF3CAoAAQoICAgIqwYAFwAIbUg=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOArqAAD4ASKTCgGAPX8AAAELANyRAAAAAEUAABwXygAAARGG7goAAQoICAgIqwYAFwAIbUg=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOC5tAAD3AXQDCv4LTX8AAAELANyRAAAAAEUAABwUwgAAARGJ9goAAQoICAgIqwYAFwAIbUg=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOCujAAD3AWtMWWHIan8AAAELANyRAAAAAEUAABxoVgAAARE2YgoAAQoICAgIqwYAFwAIbUg=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYAbjAAD2AZBQWWHI/n8AAAELANyRAAAAAEUAABx9VQAAAREhYwoAAQoICAgIqwYAFwAIbUgA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOCEkAAD2Ad3wPmV8QX8AAAELANyRAAAAAEUAABw+mwAAARFgHQoAAQoICAgIqwYAFwAIbUg=
- summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOIKTAAD/ASMnCgABAX8AAAELABAzAAAAAEUAABwyEQAAARFspwoAAQoICAgIXY8AUAAIhuU=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOE9OAAD9AXERCgHnmn8AAAELAANFAAAAAEUAABxMDAAAARFSrAoAAQoICAgIXY8AUAAIk9M=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOHJUAAB+AcUdCkjwAX8AAAELAANFAAAAAEUAABwhEwAAARF9pQoAAQoICAgIXY8AUAAIk9M=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOBp0AAD8AevCCvuhyX8AAAELAANFAAAAAEUAABwb5AAAARGC1AoAAQoICAgIXY8AUAAIk9M=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOFjeAAD7AbQHCvucGn8AAAELAANFAAAAAEUAABwB+QAAARGcvwoAAQoICAgIXY8AUAAIk9M=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOHRxAAD8AZaNCvudAX8AAAELAANFAAAAAEUAABwLEAAAARGTqAoAAQoICAgIXY8AUAAIk9M=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOFq4AAD7AdD2Cvd9VX8AAAELANyRAAAAAEUAABw11wAAARFo4QoAAQoICAgIXY8AUAAIuoY=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFKyAAD6AbZLCvuhwn8AAAELANyRAAAAAEUAABxcnwAAARFCGQoAAQoICAgIXY8AUAAIuoY=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOHqHAAD5AbXHCmd8BX8AAAELANyRAAAAAEUAABwHlAAAARGXJAoAAQoICAgIXY8AUAAIuoY=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFQMAAD4AdlwCgGAPX8AAAELANyRAAAAAEUAABw7uQAAARFi/woAAQoICAgIXY8AUAAIuoY=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOALXAAD3AZ+ZCv4LTX8AAAELANyRAAAAAEUAABxbqQAAARFDDwoAAQoICAgIXY8AUAAIuoY=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAODYEAAD3AWDrWWHIan8AAAELANyRAAAAAEUAABxiqwAAARE8DQoAAQoICAgIXY8AUAAIuoY=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYHabAAD2ASCYWWHI/n8AAAELANyRAAAAAEUAABxGQwAAARFYdQoAAQoICAgIXY8AUAAIuoYA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOHBeAAD2ASfOWWDILn8AAAELANyRAAAAAEUAABxWUQAAARFIZwoAAQoICAgIXY8AUAAIuoY=
- summary: IP / ICMP 89.96.200.46 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOIKVAAD/ASMlCgABAX8AAAELABAzAAAAAEUAABwahgAAARGEMgoAAQoICAgIPaYBuwAIpWM=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOE8ZAAB+AehYCkjwAX8AAAELAANFAAAAAEUAABwUagAAARGKTgoAAQoICAgIPaYBuwAIslE=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOFOeAAD9AWzBCgHnmn8AAAELAANFAAAAAEUAABxKrQAAARFUCwoAAQoICAgIPaYBuwAIslE=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAODmqAAD8AcyMCvuhyX8AAAELAANFAAAAAEUAABxPPQAAARFPewoAAQoICAgIPaYBuwAIslE=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOFLIAAD7AbodCvucGn8AAAELAANFAAAAAEUAABxYFAAAARFGpAoAAQoICAgIPaYBuwAIslE=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOCJoAAD8AeiWCvudAX8AAAELAANFAAAAAEUAABxVHgAAARFJmgoAAQoICAgIPaYBuwAIslE=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOA5xAAD7AR0+Cvd9VX8AAAELANyRAAAAAEUAABw7RgAAARFjcgoAAQoICAgIPaYBuwAI2QQ=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAODo7AAD6Ac7CCvuhwn8AAAELANyRAAAAAEUAABx72QAAAREi3woAAQoICAgIPaYBuwAI2QQ=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOAeMAAD5ASjDCmd8BX8AAAELANyRAAAAAEUAABxiTwAAARE8aQoAAQoICAgIPaYBuwAI2QQ=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOGPpAAD4AcmTCgGAPX8AAAELANyRAAAAAEUAABxQHQAAARFOmwoAAQoICAgIPaYBuwAI2QQ=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOAndAAD3AZiTCv4LTX8AAAELANyRAAAAAEUAABxzpQAAARErEwoAAQoICAgIPaYBuwAI2QQ=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFgXAAD3AT7YWWHIan8AAAELANyRAAAAAEUAABxnRwAAARE3cQoAAQoICAgIPaYBuwAI2QQ=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYFGuAAD2AUWFWWHI/n8AAAELANyRAAAAAEUAABxq/QAAAREzuwoAAQoICAgIPaYBuwAI2QQA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOFZTAAD2AajBPmV8QX8AAAELANyRAAAAAEUAABwEFQAAARGaowoAAQoICAgIPaYBuwAI2QQ=
- summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOIKXAAD/ASMjCgABAX8AAAELABAzAAAAAEUAABwTtAAAARGLBAoAAQoICAgIKu///wAIudU=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOEQZAAB+AfNYCkjwAX8AAAELAANFAAAAAEUAABxJIQAAARFVlwoAAQoICAgIKu///wAIxsM=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOFUpAAD9AWs2CgHnmn8AAAELAANFAAAAAEUAABwFwQAAARGY9woAAQoICAgIKu///wAIxsM=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOGsKAAD8AZssCvuhyX8AAAELAANFAAAAAEUAABxCgQAAARFcNwoAAQoICAgIKu///wAIxsM=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOAmpAAD7AQM9CvucGn8AAAELAANFAAAAAEUAABwYIAAAARGGmAoAAQoICAgIKu///wAIxsM=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOGCXAAD8AapnCvudAX8AAAELAANFAAAAAEUAABwTKgAAARGLjgoAAQoICAgIKu///wAIxsM=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOBOTAAD7ARgcCvd9VX8AAAELANyRAAAAAEUAABwVJwAAARGJkQoAAQoICAgIKu///wAI7XY=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAODC3AAD6AdhGCvuhwn8AAAELANyRAAAAAEUAABxDtQAAARFbAwoAAQoICAgIKu///wAI7XY=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAODedAAD5AfixCmd8BX8AAAELANyRAAAAAEUAABxN4QAAARFQ1woAAQoICAgIKu///wAI7XY=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFx1AAD4AdEHCgGAPX8AAAELANyRAAAAAEUAABw0gwAAARFqNQoAAQoICAgIKu///wAI7XY=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOHArAAD3ATJFCv4LTX8AAAELANyRAAAAAEUAABwNQgAAARGRdgoAAQoICAgIKu///wAI7XY=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOEe3AAD3AU84WWHIan8AAAELANyRAAAAAEUAABwZfgAAARGFOgoAAQoICAgIKu///wAI7XY=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYFc0AAD2AT//WWHI/n8AAAELANyRAAAAAEUAABwz2wAAARFq3QoAAQoICAgIKu///wAI7XYA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAODTWAAD2AWNWWWDILn8AAAELANyRAAAAAEUAABxoqgAAARE2DgoAAQoICAgIKu///wAI7XY=
- summary: IP / ICMP 89.96.200.46 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOIKQAAD/ASMqCgABAX8AAAELABAzAAAAAEUAABxylwAAAREsIQoAAQoICAgIO4EAFgAIqS0=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOCCDAAD9AZ/cCgHnmn8AAAELAANFAAAAAEUAABxqEAAAARE0qAoAAQoICAgIO4EAFgAIths=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOHMJAAB+AcRoCkjwAX8AAAELAANFAAAAAEUAABxhYgAAARE9VgoAAQoICAgIO4EAFgAIths=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOHFtAAD8AZTJCvuhyX8AAAELAANFAAAAAEUAABxsUwAAAREyZQoAAQoICAgIO4EAFgAIths=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOCG0AAD7AesxCvucGn8AAAELAANFAAAAAEUAABw13gAAARFo2goAAQoICAgIO4EAFgAIths=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOGzBAAD8AZ49CvudAX8AAAELAANFAAAAAEUAABxULwAAARFKiQoAAQoICAgIO4EAFgAIths=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOGVtAAD7AcZBCvd9VX8AAAELANyRAAAAAEUAABwlYwAAARF5VQoAAQoICAgIO4EAFgAI3M4=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAODepAAD6AdFUCvuhwn8AAAELANyRAAAAAEUAABwplgAAARF1IgoAAQoICAgIO4EAFgAI3M4=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOHKlAAD5Ab2pCmd8BX8AAAELANyRAAAAAEUAABwebwAAARGASQoAAQoICAgIO4EAFgAI3M4=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOD0XAAD4AfBlCgGAPX8AAAELANyRAAAAAEUAABwUBgAAARGKsgoAAQoICAgIO4EAFgAI3M4=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOD9VAAD3AWMbCv4LTX8AAAELANyRAAAAAEUAABxcmwAAARFCHQoAAQoICAgIO4EAFgAI3M4=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOBGoAAD3AYVHWWHIan8AAAELANyRAAAAAEUAABw3TAAAARFnbAoAAQoICAgIO4EAFgAI3M4=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYENwAAD2AVPDWWHI/n8AAAELANyRAAAAAEUAABw0HwAAARFqmQoAAQoICAgIO4EAFgAI3M4A
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOEnSAAD2AU4KWWDIfn8AAAELANyRAAAAAEUAABwrHAAAARFznAoAAQoICAgIO4EAFgAI3M4=
- summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOIKUAAD/ASMmCgABAX8AAAELABAzAAAAAEUAAByqJgAAARH0kQoAAQoICAgIc54AewAIcKs=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOE82AAB+Aeg7CkjwAX8AAAELAANFAAAAAEUAABxr8AAAAREyyAoAAQoICAgIc54AewAIfZk=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOG3VAAD9AVKKCgHnmn8AAAELAANFAAAAAEUAABx19QAAAREowwoAAQoICAgIc54AewAIfZk=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOCIYAAD8AeQeCvuhyX8AAAELAANFAAAAAEUAABwhzQAAARF86woAAQoICAgIc54AewAIfZk=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOGbTAAD7AaYSCvucGn8AAAELAANFAAAAAEUAABwbvQAAARGC+woAAQoICAgIc54AewAIfZk=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOD1WAAD8Ac2oCvudAX8AAAELAANFAAAAAEUAABwr9QAAARFywwoAAQoICAgIc54AewAIfZk=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOH6cAAD7Aa0SCvd9VX8AAAELANyRAAAAAEUAABxJwwAAARFU9QoAAQoICAgIc54AewAIpEw=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOCzzAAD6AdwKCvuhwn8AAAELANyRAAAAAEUAABwhMAAAARF9iAoAAQoICAgIc54AewAIpEw=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOGwyAAD5AcQcCmd8BX8AAAELANyRAAAAAEUAABwlAQAAARF5twoAAQoICAgIc54AewAIpEw=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOB9UAAD4AQ4pCgGAPX8AAAELANyRAAAAAEUAABwZwAAAARGE+AoAAQoICAgIc54AewAIpEw=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOAEzAAD3AaE9Cv4LTX8AAAELANyRAAAAAEUAABxWVgAAARFIYgoAAQoICAgIc54AewAIpEw=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOEZsAAD3AVCDWWHIan8AAAELANyRAAAAAEUAABwVYgAAARGJVgoAAQoICAgIc54AewAIpEw=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYBbkAAD2AYBPWWHI/n8AAAELANyRAAAAAEUAABx+9wAAAREfwQoAAQoICAgIc54AewAIpEwA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOBWnAAD2AYI1WWDIfn8AAAELANyRAAAAAEUAABxpoQAAARE1FwoAAQoICAgIc54AewAIpEw=
- summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOIKYAAD/ASMiCgABAX8AAAELAPT/AAAAAEUAABzb1QAAAQHC8goAAQoICAgICAD3/wAAAAA=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAOHlSAAB+Ab4fCkjwAX8AAAELAJBjAAAAAEUAABxRTgAAAQFNegoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RcAAOCJxAAD9AZ3uCgHnmn8AAAELAJBjAAAAAEUAABwuRwAAAQFwgQoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RcAAOAkgAAD8Af0WCvuhyX8AAAELAJBjAAAAAEUAABxwFwAAAQEusQoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RcAAODfFAAD7AdUgCvucGn8AAAELAJBjAAAAAEUAABxTpQAAAQFLIwoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RcAAOD5TAAD8AcyrCvudAX8AAAELAJBjAAAAAEUAABwyrQAAAQFsGwoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RcAAOBEIAAD7ARqnCvd9VX8AAAELAJBjAAAAAEUAABwYRwAAAQGGgQoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAOC3cAAD6AdshCvuhwn8AAAELAJBjAAAAAEUAABwg9gAAAQF90goAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAOCthAAD5AQTuCmd8BX8AAAELAJBjAAAAAEUAABwaNQAAAQGEkwoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAODD8AAD4AfyACgGAPX8AAAELAJBjAAAAAEUAABwhdgAAAQF9UgoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAODi3AAD3AWm5Cv4LTX8AAAELAJBjAAAAAEUAABwoFAAAAQF2tAoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAOB6fAAD3AXhQWWHIan8AAAELAJBjAAAAAEUAABwC/gAAAQGbygoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAYHGYAAD2ASWbWWHI/n8AAAELAJBjAAAAAEUAABxc4wAAAQFB5QoAAQoICAgICABcnAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror / Padding
-- - raw_packet: !!binary |
- RQAAOEnfAAD2AU39WWDIfn8AAAELAJBjAAAAAEUAABwDBwAAAQGbwQoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAODaSAAD2AWfjSA7TN38AAAELAJBjAAAAAEUAABxRwAAAAQFNCAoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 72.14.211.55 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAOEIPAAD1AbX50VXxXH8AAAELAJBjAAAAAEWAABxj+gAAAQE6TgoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 209.85.241.92 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAqBEjAADwAX3LSA7oTn8AAAELAJBjAAAAAEWAABwY8AAAAQGFWAoAAQoICAgICABcnAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIADZJgAIAQFczqkB
- summary: IP / ICMP 72.14.232.78 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror / Padding
-- - raw_packet: !!binary |
- RQAAOEMpAADxAavH0VX+dH8AAAELAJBjAAAAAEWAABw+9gAAAQFfUgoAAQoICAgICABcnAAAAAA=
- summary: IP / ICMP 209.85.254.116 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / ICMPerror
-- - raw_packet: !!binary |
- RQAAHAV3AAArAW9RCAgICH8AAAEAAP//AAAAAA==
- summary: IP / ICMP 8.8.8.8 > 127.0.0.1 echo-reply 0
-- - raw_packet: !!binary |
- RQAAHAJwAAArAXJYCAgICH8AAAEAAP//AAAAAA==
- summary: IP / ICMP 8.8.8.8 > 127.0.0.1 echo-reply 0
-- - raw_packet: !!binary |
- RQAAOIKSAAD/ASMoCgABAX8AAAELABAzAAAAAEUAABz9GQAAARGhngoAAQoICAgIJAYANQAIwIk=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAODjdAAD9AYeCCgHnmn8AAAELAANFAAAAAEUAABxkigAAARE6LgoAAQoICAgIJAYANQAIzXc=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAODaTAAD8Ac+jCvuhyX8AAAELAANFAAAAAEUAABwL2wAAARGS3QoAAQoICAgIJAYANQAIzXc=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOBigAAD7AfRFCvucGn8AAAELAANFAAAAAEUAABxTSQAAARFLbwoAAQoICAgIJAYANQAIzXc=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOEegAAD8AcNeCvudAX8AAAELAANFAAAAAEUAABwXpgAAARGHEgoAAQoICAgIJAYANQAIzXc=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOF63AAD7Acz3Cvd9VX8AAAELANyRAAAAAEUAABw6EgAAARFkpgoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAODCFAAB+AQbtCkjwAX8AAAELAANFAAAAAEUAABwq2QAAARFz3woAAQoICAgIJAYANQAIzXc=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFQoAAD6AbTVCvuhwn8AAAELANyRAAAAAEUAABwOIgAAARGQlgoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOAyAAAD5ASPPCmd8BX8AAAELANyRAAAAAEUAABxhaAAAARE9UAoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOAFtAAD4ASwQCgGAPX8AAAELANyRAAAAAEUAABxNUwAAARFRZQoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFSiAAD3AU3OCv4LTX8AAAELANyRAAAAAEUAABw9YgAAARFhVgoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOEjBAAD3AU4uWWHIan8AAAELANyRAAAAAEUAABxokQAAARE2JwoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYG2bAAD2ASmYWWHI/n8AAAELANyRAAAAAEUAABx07gAAAREpygoAAQoICAgIJAYANQAI9CoA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOGhGAAD0ATgNSA7TWX8AAAELANyRAAAAAEUAABxZhwAAARFFMQoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 72.14.211.89 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOCFhAADyAdml0VXxXn8AAAELANyRAAAAAEWAABwSvgAAARGLegoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 209.85.241.94 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOEivAAD2AU8tWWDIfn8AAAELANyRAAAAAEUAABxjEwAAARE7pQoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAqAQMAADzAYfkSA7oTH8AAAELANyRAAAAAEWAABw3RQAAARFm8woAAQoICAgIJAYANQAI9CoA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAsVwAIAQGJnikB
- summary: IP / ICMP 72.14.232.76 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOB9EAAD0Acyw0VX+cH8AAAELANyRAAAAAEWAABwwgAAAARFtuAoAAQoICAgIJAYANQAI9Co=
- summary: IP / ICMP 209.85.254.112 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOIKWAAD/ASMkCgABAX8AAAELABAzAAAAAEUAABw/owAAARFfFQoAAQoICAgISZgfkAAIe5w=
- summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOFSYAAB+AeLZCkjwAX8AAAELAANFAAAAAEUAABw45QAAARFl0woAAQoICAgISZgfkAAIiIo=
- summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOGbxAAD9AVluCgHnmn8AAAELAANFAAAAAEUAABwTpAAAARGLFAoAAQoICAgISZgfkAAIiIo=
- summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOE4qAAD8AbgMCvuhyX8AAAELAANFAAAAAEUAABwCWgAAARGcXgoAAQoICAgISZgfkAAIiIo=
- summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOAoSAAD7AQLUCvucGn8AAAELAANFAAAAAEUAABwlRgAAARF5cgoAAQoICAgISZgfkAAIiIo=
- summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOArZAAD8AQAmCvudAX8AAAELAANFAAAAAEUAABxmogAAARE4FgoAAQoICAgISZgfkAAIiIo=
- summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RcAAOFSsAAD7AdcCCvd9VX8AAAELANyRAAAAAEUAABxb5gAAARFC0goAAQoICAgISZgfkAAIrz0=
- summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOEXfAAD6AcMeCvuhwn8AAAELANyRAAAAAEUAABwyUQAAARFsZwoAAQoICAgISZgfkAAIrz0=
- summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOBG3AAD5AR6YCmd8BX8AAAELANyRAAAAAEUAABwhUQAAARF9ZwoAAQoICAgISZgfkAAIrz0=
- summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOGqaAAD4AcLiCgGAPX8AAAELANyRAAAAAEUAABxRkQAAARFNJwoAAQoICAgISZgfkAAIrz0=
- summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAODJzAAD3AW/9Cv4LTX8AAAELANyRAAAAAEUAABxrGQAAAREznwoAAQoICAgISZgfkAAIrz0=
- summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAOA3LAAD3AYkkWWHIan8AAAELANyRAAAAAEUAABwaIAAAARGEmAoAAQoICAgISZgfkAAIrz0=
- summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-- - raw_packet: !!binary |
- RQAAYGx9AAD2ASq2WWHI/n8AAAELANyRAAAAAEUAABwmjgAAARF4KgoAAQoICAgISZgfkAAIrz0A
- AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror / Padding
-- - raw_packet: !!binary |
- RQAAOB9FAAD2AXiPWWDIhn8AAAELANyRAAAAAEUAABwPIwAAARGPlQoAAQoICAgISZgfkAAIrz0=
- summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
- / IPerror / UDPerror
-input: null
-max_ttl: 30
-sent_packets:
-- - raw_packet: !!binary |
- RQAAKFw+AAABBs6BfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
- summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
-- - raw_packet: !!binary |
- RQAAKJOnAAACBpYYfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
- summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
-- - raw_packet: !!binary |
- RQAAKJHqAAADBpbVfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
- summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
-- - raw_packet: !!binary |
- RQAAKBF+AAAEBhZCfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
- summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
-- - raw_packet: !!binary |
- RQAAKOzMAAAFBjnzfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
- summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
-- - raw_packet: !!binary |
- RQAAKFSQAAABBtYvfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKIDRAAACBqjufwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKLfnAAADBnDYfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKDn1AAAEBu3KfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKLfdAAAFBm7ifwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKOvCAAAGBjn9fwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKOK/AAAHBkIAfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKLztAAAIBmbSfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKAzkAAAJBhXcfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKDFvAAAKBvBQfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKOEmAAALBj+ZfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKFMvAAAMBsyQfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKMN6AAANBltFfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKG0nAAAOBrCYfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
- summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
-- - raw_packet: !!binary |
- RQAAKHbiAAABBrPdfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKGakAAACBsMbfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKEY6AAADBuKFfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKB2mAAAEBgoafwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKMM1AAAFBmOKfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKCInAAAGBgOZfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKDT8AAAHBu/DfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKALhAAAIBiDffwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKGNpAAAJBr9WfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKOoKAAAKBje1fwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKNFAAAALBk9/fwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKNCoAAAMBk8XfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKPa+AAANBigBfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKI+PAAAOBo4wfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
- summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
-- - raw_packet: !!binary |
- RQAAKBHKAAABBhj2fwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKHwXAAACBq2ofwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKOu2AAADBj0JfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKCrXAAAEBvzofwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKAjxAAAFBh3PfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKABrAAAGBiVVfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKPZ9AAAHBi5CfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKHDaAAAIBrLlfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKEstAAAJBteSfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKM77AAAKBlLEfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKD9mAAALBuFZfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKHghAAAMBqeefwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKHPmAAANBqrZfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
- summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
-- - raw_packet: !!binary |
- RQAAKDRMAAABBvZzfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKE9xAAACBtpOfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKPf1AAADBjDKfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKD89AAAEBuiCfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKLQcAAAFBnKjfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKIQOAAAGBqGxfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKCaJAAAHBv42fwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKOHXAAAIBkHofwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKOJcAAAJBkBjfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKB1MAAAKBgR0fwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKNSbAAALBkwkfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKKgHAAAMBne4fwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKJsTAAANBoOsfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKN2lAAAOBkAafwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
- summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
-- - raw_packet: !!binary |
- RQAAKICDAAABBqo8fwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKAdOAAACBiJyfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKK/mAAADBnjZfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKDrnAAAEBuzYfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKED8AAAFBuXDfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKC/2AAAGBvXJfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKNPSAAAHBlDtfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKK8cAAAIBnSjfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKCjAAAAJBvn/fwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKBsiAAAKBgaefwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKBzHAAALBgP5fwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKNJzAAAMBk1MfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKFORAAANBssufwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKAQSAAAOBhmufwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
- summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
-- - raw_packet: !!binary |
- RQAAKHO+AAABBrcBfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKOH2AAACBkfJfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKBSMAAADBhQ0fwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKMRzAAAEBmNMfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKBnkAAAFBgzcfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKKVKAAAGBoB1fwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKOSdAAAHBkAifwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKFpKAAAIBsl1fwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKO//AAAJBjLAfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKNahAAAKBksefwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKFp7AAALBsZEfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKAA8AAAMBh+EfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKJGTAAANBo0sfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKH97AAAOBp5EfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
- summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
-- - raw_packet: !!binary |
- RQAAKLrvAAABBm/QfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKGt6AAACBr5FfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKMpXAAADBl5ofwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKJWZAAAEBpImfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKNMhAAAFBlOefwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKNVIAAAGBlB3fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKL1bAAAHBmdkfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKIiDAAAIBps8fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKINsAAAJBp9TfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKOAbAAAKBkGkfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKNldAAALBkdifwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKNSEAAAMBks7fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKPsJAAANBiO2fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKNXHAAAOBkf4fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKP+lAAAPBh0afwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKFKwAAAQBskPfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKIngAAARBpDffwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKGkqAAASBrCVfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKPzhAAATBhvefwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKC7oAAAUBujXfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKJGvAAAVBoUQfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKL4+AAAWBleBfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKBY+AAAXBv6BfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKOsMAAAYBiizfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKPBTAAAZBiJsfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKFnUAAAaBrfrfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKCPlAAAbBuzafwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKAW7AAAcBgoFfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKAbRAAAdBgfvfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
- summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
-- - raw_packet: !!binary |
- RQAAKOU9AAABBkWCfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKNFOAAACBlhxfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKES6AAADBuQFfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKFqUAAAEBs0rfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKKHtAAAFBoTSfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKMIXAAAGBmOofwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKBphAAAHBgpffwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKMb7AAAIBlzEfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKMoDAAAJBli8fwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKMjKAAAKBlj1fwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKBj7AAALBgfFfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKAyCAAAMBhM+fwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAKOF2AAANBj1JfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
- summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
-- - raw_packet: !!binary |
- RQAAHC8WAAABEfuqfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHAJCAAACESd/fwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHIQuAAADEaSSfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHIXkAAAEEaHcfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHPTkAAAFETHcfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHH1mAAAGEahafwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHBr3AAAHEQnKfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHB4VAAAIEQWsfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHEOxAAAJEd8PfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHLfFAAAKEWn7fwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHEJ8AAALEd5EfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHEmwAAAMEdYQfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHPOaAAANESsmfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHCQqAAAOEfmWfwAAAQgICAirBgAXAAjFrw==
- summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
-- - raw_packet: !!binary |
- RQAAHDIRAAABEfivfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHKViAAACEYRefwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHBDAAAADERgBfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHIOvAAAEEaQRfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHNa1AAAFEVALfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHEkaAAAGEdymfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHHEFAAAHEbO7fwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHG+qAAAIEbQWfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHLRcAAAJEW5kfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHO71AAAKETLLfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHD0DAAALEeO9fwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHJAkAAAMEY+cfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHNlvAAANEUVRfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHECQAAAOEd0wfwAAAQgICAhdjwBQAAgS7g==
- summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
-- - raw_packet: !!binary |
- RQAAHBqGAAABERA7fwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHLTJAAACEXT3fwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHNdaAAADEVFmfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHGUXAAAEEcKpfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHNbNAAAFEU/zfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHCrmAAAGEfrafwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHBmqAAAHEQsXfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHO0hAAAIETaffwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHF5DAAAJEcR9fwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHMFJAAAKEWB3fwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHAqRAAALERYwfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHDaAAAAMEelAfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHOYzAAANETiNfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHH0cAAAOEaCkfwAAAQgICAg9pgG7AAgxbA==
- summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
-- - raw_packet: !!binary |
- RQAAHBO0AAABERcNfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHELQAAACEebwfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHCQNAAADEQS0fwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHEy+AAAEEdsCfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHFnEAAAFEcz8fwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHDD4AAAGEfTIfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHFfLAAAHEcz1fwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHFtXAAAIEchpfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHD2gAAAJEeUgfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHM/GAAAKEVH6fwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHNDXAAALEU/pfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHIwIAAAMEZO4fwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHEOjAAANEdsdfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHHHdAAAOEavjfwAAAQgICAgq7///AAhF3g==
- summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
-- - raw_packet: !!binary |
- RQAAHHKXAAABEbgpfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHBVFAAACERR8fwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHB2zAAADEQsOfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHCsLAAAEEfy1fwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHM8mAAAFEVeafwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHH1/AAAGEahBfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHLcgAAAHEW2gfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHA8LAAAIERS2fwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHFuuAAAJEccSfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHBjXAAAKEQjqfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHOKqAAALET4WfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHCtvAAAMEfRRfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHOb2AAANETfKfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHNZ4AAAOEUdIfwAAAQgICAg7gQAWAAg1Ng==
- summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
-- - raw_packet: !!binary |
- RQAAHKomAAABEYCafwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHJzvAAACEYzRfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHHyAAAADEaxAfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHBx6AAAEEQtHfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHCdcAAAFEf9kfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHKblAAAGEX7bfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHJ9dAAAHEYVjfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHBPTAAAIEQ/ufwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHM2WAAAJEVUqfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHH05AAAKEaSHfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHHATAAALEbCtfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHMwRAAAMEVOvfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHFCmAAANEc4afwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHEq/AAAOEdMBfwAAAQgICAhzngB7AAj8sw==
- summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
-- - raw_packet: !!binary |
- RQAAHNvVAAABAU77fwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHJnCAAACAZAOfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHEhLAAADAeCFfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHPG/AAAEATYRfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHEvQAAAFAdsAfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHNROAAAGAVGCfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHG+aAAAHAbU2fwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHGw6AAAIAbeWfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHE23AAAJAdUZfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHETwAAAKAdzgfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHMl5AAALAVdXfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHEEkAAAMAd6sfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHOLVAAANATv7fwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHPtzAAAOASJdfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHKv2AAAPAXDafwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHJ4aAAAQAX22fwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHJmQAAARAYFAfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHM9gAAASAUpwfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHF87AAATAbmVfwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHJOVAAAUAYQ7fwAAAQgICAgIAPf/AAAAAA==
- summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
-- - raw_packet: !!binary |
- RQAAHP0ZAAABES2nfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHCrQAAACEf7wfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHHnUAAADEa7sfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHH4+AAAEEamCfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHPc4AAAFES+IfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHN53AAAGEUdJfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHFi/AAAHEcwBfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHM4nAAAIEVWZfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHP0vAAAJESWRfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHJmRAAAKEYgvfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHIqdAAALEZYjfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHPJhAAAMES1ffwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHHdGAAANEad6fwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHPTYAAAOESjofwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHFvwAAAPEcDQfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHP3zAAAQER3NfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHGCzAAAREboNfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHIHZAAASEZfnfwAAAQgICAgkBgA1AAhMkg==
- summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
-- - raw_packet: !!binary |
- RQAAHD+jAAABEesdfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHEMVAAACEearfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHPV4AAADETNIfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHPWLAAAEETI1fwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHLphAAAFEWxffwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHGAvAAAGEcWRfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHMi1AAAHEVwLfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHN7VAAAIEUTrfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHJmkAAAJEYkcfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHBSfAAAKEQ0ifwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHOLfAAALET3hfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHL25AAAMEWIHfwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHG7hAAANEa/ffwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-- - raw_packet: !!binary |
- RQAAHAFfAAAOERxifwAAAQgICAhJmB+QAAgHpQ==
- summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
-test_icmp_traceroute:
- hops:
- - {address: 10.0.1.1, rtt: 3.9715609550476074, ttl: 1}
- - {address: 10.72.240.1, rtt: 4.018263101577759, ttl: 2}
- - {address: 10.1.231.154, rtt: 4.0202929973602295, ttl: 3}
- - {address: 10.251.161.201, rtt: 4.024235963821411, ttl: 4}
- - {address: 10.251.156.26, rtt: 4.028274059295654, ttl: 5}
- - {address: 10.251.157.1, rtt: 4.032228946685791, ttl: 6}
- - {address: 10.247.125.85, rtt: 4.035927057266235, ttl: 7}
- - {address: 10.251.161.194, rtt: 4.039880037307739, ttl: 8}
- - {address: 10.103.124.5, rtt: 4.043823003768921, ttl: 9}
- - {address: 10.1.128.61, rtt: 4.04759407043457, ttl: 10}
- - {address: 10.254.11.77, rtt: 4.052925109863281, ttl: 11}
- - {address: 89.97.200.106, rtt: 4.056672096252441, ttl: 12}
- - {address: 89.97.200.254, rtt: 4.067225933074951, ttl: 13}
- - {address: 89.96.200.126, rtt: 4.069293975830078, ttl: 14}
- - {address: 72.14.211.55, rtt: 4.071274995803833, ttl: 15}
- - {address: 209.85.241.92, rtt: 4.073256015777588, ttl: 16}
- - {address: 72.14.232.78, rtt: 4.075243949890137, ttl: 17}
- - {address: 209.85.254.116, rtt: 4.077281951904297, ttl: 18}
- - {address: 8.8.8.8, rtt: 4.079555988311768, ttl: 19}
- - {address: 8.8.8.8, rtt: 4.5740931034088135, ttl: 20}
-test_tcp_traceroute:
- hops_0:
- - {address: 10.0.1.1, rtt: 0.8929989337921143, sport: 33550, ttl: 1}
- - {address: 10.1.231.154, rtt: 0.9173901081085205, sport: 33550, ttl: 2}
- - {address: 10.251.161.201, rtt: 0.9208340644836426, sport: 33550, ttl: 3}
- - {address: 10.251.156.26, rtt: 0.9243190288543701, sport: 33550, ttl: 4}
- - {address: 10.251.157.1, rtt: 0.9279429912567139, sport: 33550, ttl: 5}
- hops_123:
- - {address: 10.0.1.1, rtt: 1.057663917541504, sport: 10729, ttl: 1}
- - {address: 10.72.240.1, rtt: 1.0832798480987549, sport: 10729, ttl: 2}
- - {address: 10.1.231.154, rtt: 1.0852348804473877, sport: 10729, ttl: 3}
- - {address: 10.251.161.201, rtt: 1.0872218608856201, sport: 10729, ttl: 4}
- - {address: 10.251.156.26, rtt: 1.0913589000701904, sport: 10729, ttl: 5}
- - {address: 10.251.157.1, rtt: 1.0950088500976562, sport: 10729, ttl: 6}
- - {address: 10.247.125.85, rtt: 1.0984508991241455, sport: 10729, ttl: 7}
- - {address: 10.251.161.194, rtt: 1.106515884399414, sport: 10729, ttl: 8}
- - {address: 10.103.124.5, rtt: 1.1134669780731201, sport: 10729, ttl: 9}
- - {address: 10.1.128.61, rtt: 1.1153309345245361, sport: 10729, ttl: 10}
- - {address: 10.254.11.77, rtt: 1.1171259880065918, sport: 10729, ttl: 11}
- - {address: 89.97.200.106, rtt: 1.118973970413208, sport: 10729, ttl: 12}
- - {address: 62.101.124.65, rtt: 1.1317999362945557, sport: 10729, ttl: 13}
- - {address: 89.97.200.254, rtt: 1.1352579593658447, sport: 10729, ttl: 14}
- hops_22:
- - {address: 10.0.1.1, rtt: 0.887671947479248, sport: 31561, ttl: 1}
- - {address: 10.72.240.1, rtt: 0.9095978736877441, sport: 31561, ttl: 2}
- - {address: 10.1.231.154, rtt: 0.9134628772735596, sport: 31561, ttl: 3}
- - {address: 10.251.161.201, rtt: 0.9172408580780029, sport: 31561, ttl: 4}
- - {address: 10.251.156.26, rtt: 0.9208929538726807, sport: 31561, ttl: 5}
- - {address: 10.251.157.1, rtt: 0.9243419170379639, sport: 31561, ttl: 6}
- - {address: 10.247.125.85, rtt: 0.9276900291442871, sport: 31561, ttl: 7}
- - {address: 10.251.161.194, rtt: 0.9310119152069092, sport: 31561, ttl: 8}
- - {address: 10.103.124.5, rtt: 0.937445878982544, sport: 31561, ttl: 9}
- - {address: 10.1.128.61, rtt: 0.939384937286377, sport: 31561, ttl: 10}
- - {address: 10.254.11.77, rtt: 0.9427988529205322, sport: 31561, ttl: 11}
- - {address: 89.97.200.106, rtt: 0.9527590274810791, sport: 31561, ttl: 12}
- - {address: 89.97.200.254, rtt: 0.95943284034729, sport: 31561, ttl: 13}
- - {address: 89.96.200.134, rtt: 0.9697248935699463, sport: 31561, ttl: 14}
- hops_23:
- - {address: 10.0.1.1, rtt: 0.9211528301239014, sport: 5097, ttl: 1}
- - {address: 10.72.240.1, rtt: 0.9416170120239258, sport: 5097, ttl: 2}
- - {address: 10.1.231.154, rtt: 0.9434559345245361, sport: 5097, ttl: 3}
- - {address: 10.251.161.201, rtt: 0.9484758377075195, sport: 5097, ttl: 4}
- - {address: 10.251.156.26, rtt: 0.9505150318145752, sport: 5097, ttl: 5}
- - {address: 10.251.157.1, rtt: 0.9561848640441895, sport: 5097, ttl: 6}
- - {address: 10.247.125.85, rtt: 0.960468053817749, sport: 5097, ttl: 7}
- - {address: 10.251.161.194, rtt: 0.9639179706573486, sport: 5097, ttl: 8}
- - {address: 10.103.124.5, rtt: 0.9702839851379395, sport: 5097, ttl: 9}
- - {address: 10.1.128.61, rtt: 0.9737949371337891, sport: 5097, ttl: 10}
- - {address: 10.254.11.77, rtt: 0.9802989959716797, sport: 5097, ttl: 11}
- - {address: 89.97.200.106, rtt: 0.9836268424987793, sport: 5097, ttl: 12}
- - {address: 89.97.200.254, rtt: 0.99639892578125, sport: 5097, ttl: 13}
- - {address: 89.96.200.126, rtt: 1.0050489902496338, sport: 5097, ttl: 14}
- hops_443:
- - {address: 10.0.1.1, rtt: 1.0840370655059814, sport: 63889, ttl: 1}
- - {address: 10.1.231.154, rtt: 1.109666109085083, sport: 63889, ttl: 2}
- - {address: 10.251.161.201, rtt: 1.113111972808838, sport: 63889, ttl: 3}
- - {address: 10.251.156.26, rtt: 1.1165308952331543, sport: 63889, ttl: 4}
- - {address: 10.251.157.1, rtt: 1.1198999881744385, sport: 63889, ttl: 5}
- - {address: 10.247.125.85, rtt: 1.1232690811157227, sport: 63889, ttl: 6}
- - {address: 10.251.161.194, rtt: 1.1285760402679443, sport: 63889, ttl: 7}
- - {address: 10.103.124.5, rtt: 1.1326820850372314, sport: 63889, ttl: 8}
- - {address: 10.1.128.61, rtt: 1.139185905456543, sport: 63889, ttl: 9}
- - {address: 10.254.11.77, rtt: 1.1459689140319824, sport: 63889, ttl: 10}
- - {address: 89.97.200.106, rtt: 1.1481139659881592, sport: 63889, ttl: 11}
- - {address: 89.97.200.254, rtt: 1.1560420989990234, sport: 63889, ttl: 12}
- - {address: 89.96.200.134, rtt: 1.1640660762786865, sport: 63889, ttl: 13}
- hops_53:
- - {address: 10.0.1.1, rtt: 0.9541549682617188, sport: 6421, ttl: 1}
- - {address: 10.72.240.1, rtt: 0.9729020595550537, sport: 6421, ttl: 2}
- - {address: 10.1.231.154, rtt: 0.9748890399932861, sport: 6421, ttl: 3}
- - {address: 10.251.161.201, rtt: 0.9788179397583008, sport: 6421, ttl: 4}
- - {address: 10.251.156.26, rtt: 0.9826369285583496, sport: 6421, ttl: 5}
- - {address: 10.251.157.1, rtt: 0.9876649379730225, sport: 6421, ttl: 6}
- - {address: 10.247.125.85, rtt: 0.9913709163665771, sport: 6421, ttl: 7}
- - {address: 10.251.161.194, rtt: 0.997809886932373, sport: 6421, ttl: 8}
- - {address: 10.103.124.5, rtt: 0.9996218681335449, sport: 6421, ttl: 9}
- - {address: 10.1.128.61, rtt: 1.0029208660125732, sport: 6421, ttl: 10}
- - {address: 10.254.11.77, rtt: 1.0111238956451416, sport: 6421, ttl: 11}
- - {address: 89.97.200.106, rtt: 1.0159449577331543, sport: 6421, ttl: 12}
- - {address: 89.97.200.254, rtt: 1.0279550552368164, sport: 6421, ttl: 13}
- - {address: 89.96.200.46, rtt: 1.0326428413391113, sport: 6421, ttl: 14}
- - {address: 72.14.211.89, rtt: 1.039456844329834, sport: 6421, ttl: 15}
- - {address: 209.85.241.92, rtt: 1.0447049140930176, sport: 6421, ttl: 16}
- - {address: 72.14.232.78, rtt: 1.0516810417175293, sport: 6421, ttl: 17}
- - {address: 209.85.254.114, rtt: 1.058819055557251, sport: 6421, ttl: 18}
- - {address: 8.8.8.8, rtt: 1.064857006072998, sport: 6421, ttl: 19}
- - {address: 8.8.8.8, rtt: 1.074767827987671, sport: 6421, ttl: 20}
- - {address: 8.8.8.8, rtt: 1.0773730278015137, sport: 6421, ttl: 21}
- - {address: 8.8.8.8, rtt: 1.0835769176483154, sport: 6421, ttl: 22}
- - {address: 8.8.8.8, rtt: 1.0862410068511963, sport: 6421, ttl: 23}
- - {address: 8.8.8.8, rtt: 1.0980219841003418, sport: 6421, ttl: 24}
- - {address: 8.8.8.8, rtt: 1.1042819023132324, sport: 6421, ttl: 25}
- - {address: 8.8.8.8, rtt: 1.1147940158843994, sport: 6421, ttl: 26}
- - {address: 8.8.8.8, rtt: 1.1190860271453857, sport: 6421, ttl: 27}
- - {address: 8.8.8.8, rtt: 1.1216108798980713, sport: 6421, ttl: 28}
- - {address: 8.8.8.8, rtt: 1.127511978149414, sport: 6421, ttl: 29}
- hops_65535:
- - {address: 10.0.1.1, rtt: 1.1430189609527588, sport: 37293, ttl: 1}
- - {address: 10.72.240.1, rtt: 1.168022871017456, sport: 37293, ttl: 2}
- - {address: 10.1.231.154, rtt: 1.1717679500579834, sport: 37293, ttl: 3}
- - {address: 10.251.161.201, rtt: 1.1754209995269775, sport: 37293, ttl: 4}
- - {address: 10.251.156.26, rtt: 1.177292823791504, sport: 37293, ttl: 5}
- - {address: 10.251.157.1, rtt: 1.1840429306030273, sport: 37293, ttl: 6}
- - {address: 10.247.125.85, rtt: 1.185985803604126, sport: 37293, ttl: 7}
- - {address: 10.251.161.194, rtt: 1.1920018196105957, sport: 37293, ttl: 8}
- - {address: 10.103.124.5, rtt: 1.1955947875976562, sport: 37293, ttl: 9}
- - {address: 10.1.128.61, rtt: 1.1989409923553467, sport: 37293, ttl: 10}
- - {address: 10.254.11.77, rtt: 1.2022309303283691, sport: 37293, ttl: 11}
- - {address: 89.97.200.106, rtt: 1.2070260047912598, sport: 37293, ttl: 12}
- - {address: 89.97.200.254, rtt: 1.236454963684082, sport: 37293, ttl: 13}
- - {address: 89.96.200.134, rtt: 1.2652239799499512, sport: 37293, ttl: 14}
- hops_80:
- - {address: 10.0.1.1, rtt: 0.9794230461120605, sport: 48728, ttl: 1}
- - {address: 10.1.231.154, rtt: 1.0122148990631104, sport: 48728, ttl: 2}
- - {address: 10.72.240.1, rtt: 1.0160748958587646, sport: 48728, ttl: 3}
- - {address: 10.251.161.201, rtt: 1.022981882095337, sport: 48728, ttl: 4}
- - {address: 10.251.156.26, rtt: 1.0264310836791992, sport: 48728, ttl: 5}
- - {address: 10.251.157.1, rtt: 1.036902904510498, sport: 48728, ttl: 6}
- - {address: 10.247.125.85, rtt: 1.0441060066223145, sport: 48728, ttl: 7}
- - {address: 10.251.161.194, rtt: 1.0476000308990479, sport: 48728, ttl: 8}
- - {address: 10.103.124.5, rtt: 1.056222915649414, sport: 48728, ttl: 9}
- - {address: 10.1.128.61, rtt: 1.0620770454406738, sport: 48728, ttl: 10}
- - {address: 10.254.11.77, rtt: 1.0713310241699219, sport: 48728, ttl: 11}
- - {address: 89.97.200.106, rtt: 1.0809619426727295, sport: 48728, ttl: 12}
- - {address: 89.97.200.254, rtt: 1.0914230346679688, sport: 48728, ttl: 13}
- - {address: 89.96.200.126, rtt: 1.0984768867492676, sport: 48728, ttl: 14}
- hops_8080:
- - {address: 10.0.1.1, rtt: 1.1146080493927002, sport: 57884, ttl: 1}
- - {address: 10.1.231.154, rtt: 1.1394469738006592, sport: 57884, ttl: 2}
- - {address: 10.251.161.201, rtt: 1.1429920196533203, sport: 57884, ttl: 3}
- - {address: 10.251.156.26, rtt: 1.1465580463409424, sport: 57884, ttl: 4}
- - {address: 10.251.157.1, rtt: 1.150658130645752, sport: 57884, ttl: 5}
- - {address: 10.247.125.85, rtt: 1.1548030376434326, sport: 57884, ttl: 6}
- - {address: 10.251.161.194, rtt: 1.1582081317901611, sport: 57884, ttl: 7}
- - {address: 10.103.124.5, rtt: 1.1615681648254395, sport: 57884, ttl: 8}
- - {address: 10.1.128.61, rtt: 1.1648681163787842, sport: 57884, ttl: 9}
- - {address: 10.254.11.77, rtt: 1.1742961406707764, sport: 57884, ttl: 10}
- - {address: 89.97.200.106, rtt: 1.177865982055664, sport: 57884, ttl: 11}
- - {address: 89.97.200.254, rtt: 1.1897270679473877, sport: 57884, ttl: 12}
- - {address: 62.101.124.65, rtt: 1.1932711601257324, sport: 57884, ttl: 13}
-test_udp_traceroute:
- hops_0: []
- hops_123:
- - {address: 10.0.1.1, rtt: 2.8643651008605957, sport: 29598, ttl: 1}
- - {address: 10.72.240.1, rtt: 2.9663000106811523, sport: 29598, ttl: 2}
- - {address: 10.1.231.154, rtt: 2.985211133956909, sport: 29598, ttl: 3}
- - {address: 10.251.161.201, rtt: 3.0045831203460693, sport: 29598, ttl: 4}
- - {address: 10.251.156.26, rtt: 3.018602132797241, sport: 29598, ttl: 5}
- - {address: 10.251.157.1, rtt: 3.0379550457000732, sport: 29598, ttl: 6}
- - {address: 10.247.125.85, rtt: 3.0577399730682373, sport: 29598, ttl: 7}
- - {address: 10.251.161.194, rtt: 3.071830987930298, sport: 29598, ttl: 8}
- - {address: 10.103.124.5, rtt: 3.096630096435547, sport: 29598, ttl: 9}
- - {address: 10.1.128.61, rtt: 3.110487937927246, sport: 29598, ttl: 10}
- - {address: 10.254.11.77, rtt: 3.159827947616577, sport: 29598, ttl: 11}
- - {address: 89.97.200.106, rtt: 3.1841320991516113, sport: 29598, ttl: 12}
- - {address: 89.97.200.254, rtt: 3.221647024154663, sport: 29598, ttl: 13}
- - {address: 89.96.200.126, rtt: 3.2409000396728516, sport: 29598, ttl: 14}
- hops_22:
- - {address: 10.0.1.1, rtt: 1.3334949016571045, sport: 15233, ttl: 1}
- - {address: 10.1.231.154, rtt: 1.4409840106964111, sport: 15233, ttl: 2}
- - {address: 10.72.240.1, rtt: 1.4585249423980713, sport: 15233, ttl: 3}
- - {address: 10.251.161.201, rtt: 1.482278823852539, sport: 15233, ttl: 4}
- - {address: 10.251.156.26, rtt: 1.5005879402160645, sport: 15233, ttl: 5}
- - {address: 10.251.157.1, rtt: 1.531883955001831, sport: 15233, ttl: 6}
- - {address: 10.247.125.85, rtt: 1.5560660362243652, sport: 15233, ttl: 7}
- - {address: 10.251.161.194, rtt: 1.5865838527679443, sport: 15233, ttl: 8}
- - {address: 10.103.124.5, rtt: 1.6111359596252441, sport: 15233, ttl: 9}
- - {address: 10.1.128.61, rtt: 1.6353850364685059, sport: 15233, ttl: 10}
- - {address: 10.254.11.77, rtt: 1.6537768840789795, sport: 15233, ttl: 11}
- - {address: 89.97.200.106, rtt: 1.6786339282989502, sport: 15233, ttl: 12}
- - {address: 89.97.200.254, rtt: 1.7631969451904297, sport: 15233, ttl: 13}
- - {address: 89.96.200.126, rtt: 1.7871499061584473, sport: 15233, ttl: 14}
- hops_23:
- - {address: 10.0.1.1, rtt: 1.6981499195098877, sport: 43782, ttl: 1}
- - {address: 10.72.240.1, rtt: 1.8316938877105713, sport: 43782, ttl: 2}
- - {address: 10.1.231.154, rtt: 1.8493030071258545, sport: 43782, ttl: 3}
- - {address: 10.251.161.201, rtt: 1.878938913345337, sport: 43782, ttl: 4}
- - {address: 10.251.156.26, rtt: 1.9026379585266113, sport: 43782, ttl: 5}
- - {address: 10.251.157.1, rtt: 1.9251139163970947, sport: 43782, ttl: 6}
- - {address: 10.247.125.85, rtt: 1.9485108852386475, sport: 43782, ttl: 7}
- - {address: 10.251.161.194, rtt: 1.9832098484039307, sport: 43782, ttl: 8}
- - {address: 10.103.124.5, rtt: 2.0001959800720215, sport: 43782, ttl: 9}
- - {address: 10.1.128.61, rtt: 2.0243330001831055, sport: 43782, ttl: 10}
- - {address: 10.254.11.77, rtt: 2.047346830368042, sport: 43782, ttl: 11}
- - {address: 89.97.200.106, rtt: 2.070168972015381, sport: 43782, ttl: 12}
- - {address: 89.97.200.254, rtt: 2.1522560119628906, sport: 43782, ttl: 13}
- - {address: 62.101.124.65, rtt: 2.9604408740997314, sport: 43782, ttl: 14}
- hops_443:
- - {address: 10.0.1.1, rtt: 3.1613810062408447, sport: 15782, ttl: 1}
- - {address: 10.72.240.1, rtt: 3.2684850692749023, sport: 15782, ttl: 2}
- - {address: 10.1.231.154, rtt: 3.2818000316619873, sport: 15782, ttl: 3}
- - {address: 10.251.161.201, rtt: 3.300002098083496, sport: 15782, ttl: 4}
- - {address: 10.251.156.26, rtt: 3.323151111602783, sport: 15782, ttl: 5}
- - {address: 10.251.157.1, rtt: 3.3413009643554688, sport: 15782, ttl: 6}
- - {address: 10.247.125.85, rtt: 3.359462022781372, sport: 15782, ttl: 7}
- - {address: 10.251.161.194, rtt: 3.377542018890381, sport: 15782, ttl: 8}
- - {address: 10.103.124.5, rtt: 3.396583080291748, sport: 15782, ttl: 9}
- - {address: 10.1.128.61, rtt: 3.4149301052093506, sport: 15782, ttl: 10}
- - {address: 10.254.11.77, rtt: 3.4378039836883545, sport: 15782, ttl: 11}
- - {address: 89.97.200.106, rtt: 3.4557440280914307, sport: 15782, ttl: 12}
- - {address: 89.97.200.254, rtt: 3.5199360847473145, sport: 15782, ttl: 13}
- - {address: 62.101.124.65, rtt: 3.5376710891723633, sport: 15782, ttl: 14}
- hops_53:
- - {address: 10.0.1.1, rtt: 2.0826339721679688, sport: 9222, ttl: 1}
- - {address: 10.1.231.154, rtt: 2.1999151706695557, sport: 9222, ttl: 2}
- - {address: 10.251.161.201, rtt: 2.2224841117858887, sport: 9222, ttl: 3}
- - {address: 10.251.156.26, rtt: 2.2450520992279053, sport: 9222, ttl: 4}
- - {address: 10.251.157.1, rtt: 2.267009973526001, sport: 9222, ttl: 5}
- - {address: 10.247.125.85, rtt: 2.2895491123199463, sport: 9222, ttl: 6}
- - {address: 10.72.240.1, rtt: 2.4096531867980957, sport: 9222, ttl: 7}
- - {address: 10.251.161.194, rtt: 2.425421953201294, sport: 9222, ttl: 8}
- - {address: 10.103.124.5, rtt: 2.441133975982666, sport: 9222, ttl: 9}
- - {address: 10.1.128.61, rtt: 2.457381010055542, sport: 9222, ttl: 10}
- - {address: 10.254.11.77, rtt: 2.4967970848083496, sport: 9222, ttl: 11}
- - {address: 89.97.200.106, rtt: 2.5189261436462402, sport: 9222, ttl: 12}
- - {address: 89.97.200.254, rtt: 2.550632953643799, sport: 9222, ttl: 13}
- - {address: 72.14.211.89, rtt: 2.5663211345672607, sport: 9222, ttl: 14}
- - {address: 209.85.241.94, rtt: 2.582092046737671, sport: 9222, ttl: 15}
- - {address: 89.96.200.126, rtt: 2.5982320308685303, sport: 9222, ttl: 16}
- - {address: 72.14.232.76, rtt: 2.661022186279297, sport: 9222, ttl: 17}
- - {address: 209.85.254.112, rtt: 2.7243690490722656, sport: 9222, ttl: 18}
- hops_65535:
- - {address: 10.0.1.1, rtt: 3.7303781509399414, sport: 10991, ttl: 1}
- - {address: 10.72.240.1, rtt: 3.7946829795837402, sport: 10991, ttl: 2}
- - {address: 10.1.231.154, rtt: 3.8064370155334473, sport: 10991, ttl: 3}
- - {address: 10.251.161.201, rtt: 3.8219411373138428, sport: 10991, ttl: 4}
- - {address: 10.251.156.26, rtt: 3.8330190181732178, sport: 10991, ttl: 5}
- - {address: 10.251.157.1, rtt: 3.8488430976867676, sport: 10991, ttl: 6}
- - {address: 10.247.125.85, rtt: 3.864877939224243, sport: 10991, ttl: 7}
- - {address: 10.251.161.194, rtt: 3.9216160774230957, sport: 10991, ttl: 8}
- - {address: 10.103.124.5, rtt: 3.9326281547546387, sport: 10991, ttl: 9}
- - {address: 10.1.128.61, rtt: 3.9524900913238525, sport: 10991, ttl: 10}
- - {address: 10.254.11.77, rtt: 3.9684531688690186, sport: 10991, ttl: 11}
- - {address: 89.97.200.106, rtt: 3.9926950931549072, sport: 10991, ttl: 12}
- - {address: 89.97.200.254, rtt: 4.027745008468628, sport: 10991, ttl: 13}
- - {address: 89.96.200.46, rtt: 4.04297399520874, sport: 10991, ttl: 14}
- hops_80:
- - {address: 10.0.1.1, rtt: 2.4942288398742676, sport: 23951, ttl: 1}
- - {address: 10.1.231.154, rtt: 2.584718942642212, sport: 23951, ttl: 2}
- - {address: 10.72.240.1, rtt: 2.5997419357299805, sport: 23951, ttl: 3}
- - {address: 10.251.161.201, rtt: 2.6360549926757812, sport: 23951, ttl: 4}
- - {address: 10.251.156.26, rtt: 2.6616249084472656, sport: 23951, ttl: 5}
- - {address: 10.251.157.1, rtt: 2.6992008686065674, sport: 23951, ttl: 6}
- - {address: 10.247.125.85, rtt: 2.7195730209350586, sport: 23951, ttl: 7}
- - {address: 10.251.161.194, rtt: 2.745745897293091, sport: 23951, ttl: 8}
- - {address: 10.103.124.5, rtt: 2.7869420051574707, sport: 23951, ttl: 9}
- - {address: 10.1.128.61, rtt: 2.8128459453582764, sport: 23951, ttl: 10}
- - {address: 10.254.11.77, rtt: 2.838701009750366, sport: 23951, ttl: 11}
- - {address: 89.97.200.106, rtt: 2.853529930114746, sport: 23951, ttl: 12}
- - {address: 89.97.200.254, rtt: 2.945657968521118, sport: 23951, ttl: 13}
- - {address: 89.96.200.46, rtt: 2.9657039642333984, sport: 23951, ttl: 14}
- hops_8080:
- - {address: 10.0.1.1, rtt: 3.457942008972168, sport: 18840, ttl: 1}
- - {address: 10.72.240.1, rtt: 3.5681920051574707, sport: 18840, ttl: 2}
- - {address: 10.1.231.154, rtt: 3.5803709030151367, sport: 18840, ttl: 3}
- - {address: 10.251.161.201, rtt: 3.5968568325042725, sport: 18840, ttl: 4}
- - {address: 10.251.156.26, rtt: 3.6134979724884033, sport: 18840, ttl: 5}
- - {address: 10.251.157.1, rtt: 3.62577486038208, sport: 18840, ttl: 6}
- - {address: 10.247.125.85, rtt: 3.6425728797912598, sport: 18840, ttl: 7}
- - {address: 10.251.161.194, rtt: 3.659623861312866, sport: 18840, ttl: 8}
- - {address: 10.103.124.5, rtt: 3.6761529445648193, sport: 18840, ttl: 9}
- - {address: 10.1.128.61, rtt: 3.6931769847869873, sport: 18840, ttl: 10}
- - {address: 10.254.11.77, rtt: 3.7094268798828125, sport: 18840, ttl: 11}
- - {address: 89.97.200.106, rtt: 3.731276035308838, sport: 18840, ttl: 12}
- - {address: 89.97.200.254, rtt: 3.7874269485473633, sport: 18840, ttl: 13}
- - {address: 89.96.200.134, rtt: 3.823248863220215, sport: 18840, ttl: 14}
-timeout: 5
-...
-```
-
-# Privacy considerations
-
-The scapyt report format includes the binary packets as sent or received. In the ICMP response payload a portion (64 bits) or all of the original packet is returned. The client source address will be contained in the report.
diff --git a/test-specs/ts-009-multi-protocol-traceroute.md b/test-specs/ts-009-multi-protocol-traceroute.md
new file mode 100644
index 0000000..0a08457
--- /dev/null
+++ b/test-specs/ts-009-multi-protocol-traceroute.md
@@ -0,0 +1,2384 @@
+# Specification version number
+
+2013-10-07-000
+
+# Specification name
+
+Multi Protocol Traceroute test
+
+# Test preconditions
+
+ * An internet connection.
+ * Ability to run ooni-probe as root or with raw sockets capabilities
+
+For reporting to the backend to work that it is possible for the probe to
+establish a connection to the Tor network.
+
+# Expected impact
+
+ * Ability to determine differences in network paths of
+ different protocols and ports
+
+
+# Expected inputs
+
+ * No additional inputs are required as the destination host
+ (backend) defaults to 8.8.8.8. The backend can optionally
+ be specified with argument -b.
+
+ * Additional parameters such as source port, maximum TTL,
+ and timeout values can also be set
+
+
+## Semantics
+
+ * The backend host is specified as a dotted-quad IPv4
+ address.
+
+ * Maximum TTL defaults to 30.
+
+# Test description
+
+A series of packets are constructed and sent to the backend
+host with incrementing TTL values (traceroute).
+
+See also: https://tools.ietf.org/rfc/rfc792.txt
+
+For protocols UDP and TCP, a traceroute is performed for each
+of the following ports: 0, 22, 23, 53, 80, 123, 443, 8080,
+65535.
+
+For protocol ICMP, there is only a single series of packets
+as there is no concept of ports.
+
+The time-exceeded ICMP responses are added to the report.
+
+# Expected output
+
+The collected ICMP time-exceeded responses from IP routers
+that properly implement RFC792 in the forward path towards
+the backend host.
+
+## Parent data format
+
+df-003-scapyt
+
+## Semantics
+
+The report object will contain keys of the format "hops_" +
+port, e.g. report['hops_22']. The corresponding value is an
+ordered list of the parsed responses, encoded like so:
+
+{'ttl': The TTL of the packet sent,
+ 'address', The address of the remote host at which the TTL expired,
+ 'rtt', the round-trip-time, measured as the difference between the received response and sent packet time.
+ 'sport', the source port of the sent packet
+}
+
+## Possible conclusions
+
+By examining the differences in the responses between protocols and destination ports, it is possible to ascertain that routing decisions are made on a protocol layer above IP, and determine what path was taken for different protocols.
+
+## Example output sample
+
+```
+###########################################
+# OONI Probe Report for multi_protocol_traceroute_test (0.2)
+# Thu Jan 2 16:54:10 2014
+###########################################
+---
+input_hashes: []
+options: [-b, 8.8.8.8]
+probe_asn: AS0
+probe_cc: null
+probe_city: null
+probe_ip: 127.0.0.1
+software_name: ooniprobe
+software_version: 1.0.0-rc5
+start_time: 1388678050.83065
+test_name: multi_protocol_traceroute_test
+test_version: '0.2'
+...
+---
+answer_flags: [ipsrc]
+answered_packets:
+- - raw_packet: !!binary |
+ RQAAOIKHAAD/ASMzCgABAX8AAAELAHHxAAAAAEUAAChcPgAAAQZCeQoAAQoICAgIgw4AAAAAAAAA
+ AAAAUAIgAPG6AAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOEGbAAD9AX7ECgHnmn8AAAELAHHxAAAAAEUAACgm8wAAAQZ3xAoAAQoICAgIgw4AAAAAAAAA
+ AAAAUAIgAPG6AAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOF4UAAD8AagiCvuhyX8AAAELAHHxAAAAAEUAACgexAAAAQZ/8woAAQoICAgIgw4AAAAAAAAA
+ AAAAUAIgAPG6AAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOAMQAAD7AQnWCvucGn8AAAELAHHxAAAAAEUAACg0uwAAAQZp/AoAAQoICAgIgw4AAAAAAAAA
+ AAAAUAIgAPG6AAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAODxjAAD8Ac6bCvudAX8AAAELAHHxAAAAAEUAACgBwgAAAQac9QoAAQoICAgIgw4AAAAAAAAA
+ AAAAUAIgAPG6AAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOIKJAAD/ASMxCgABAX8AAAELAOD/AAAAAEUAAChUkAAAAQZKJwoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOBVxAAB+ASIBCkjwAX8AAAELAOD/AAAAAEUAACgibwAAAQZ8SAoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOHJKAAD9AU4VCgHnmn8AAAELAOD/AAAAAEUAACglXAAAAQZ5WwoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOGivAAD8AZ2HCvuhyX8AAAELAOD/AAAAAEUAACh9egAAAQYhPQoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOGGbAAD7AatKCvucGn8AAAELAOD/AAAAAEUAACgQJAAAAQaOkwoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOBn4AAD8AfEGCvudAX8AAAELAOD/AAAAAEUAACgovgAAAQZ1+QoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOGuHAAD7AcAnCvd9VX8AAAELAOD/AAAAAEUAACgoPQAAAQZ2egoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOEMPAAD6AcXuCvuhwn8AAAELAOD/AAAAAEUAACgrYwAAAQZzVAoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOBCDAAD5AR/MCmd8BX8AAAELAOD/AAAAAEUAAChfGQAAAQY/ngoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOF1gAAD4AdAcCgGAPX8AAAELAOD/AAAAAEUAACgU/gAAAQaJuQoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOAFrAAD3AaEFCv4LTX8AAAELAOD/AAAAAEUAACguhwAAAQZwMAoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODuqAAD3AVtFWWHIan8AAAELAOD/AAAAAEUAACgqZAAAAQZ0UwoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYFCFAAD2AUauWWHI/n8AAAELAFI7AAAAAEUAACh3dQAAAQYnQgoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAB7CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOAy/AAD2AYsdWWDIfn8AAAELAOD/AAAAAEUAACgNDwAAAQaRqAoAAQoICAgIE+kAFwAAAAAA
+ AAAAUAIgAGDJAAA=
+ summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOIKLAAD/ASMvCgABAX8AAAELADZXAAAAAEUAACh24gAAAQYn1QoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOE7uAAD9AXFxCgHnmn8AAAELADZXAAAAAEUAACgSBQAAAQaMsgoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOELGAAB+AfSrCkjwAX8AAAELADZXAAAAAEUAACgzAQAAAQZrtgoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOE9IAAD8AbbuCvuhyX8AAAELADZXAAAAAEUAACgfbwAAAQZ/SAoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAODJHAAD7AdqeCvucGn8AAAELADZXAAAAAEUAAChw0gAAAQYt5QoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOHr8AAD8AZACCvudAX8AAAELADZXAAAAAEUAACgxTwAAAQZtaAoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOCZ6AAD7AQU1Cvd9VX8AAAELADZXAAAAAEUAACh6uwAAAQYj/AoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOBpqAAD6Ae6TCvuhwn8AAAELADZXAAAAAEUAACg6sgAAAQZkBQoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODEjAAD5Af8rCmd8BX8AAAELADZXAAAAAEUAACg8gwAAAQZiNAoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOFftAAD4AdWPCgGAPX8AAAELADZXAAAAAEUAACgq7wAAAQZzyAoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOED1AAD3AWF7Cv4LTX8AAAELADZXAAAAAEUAACgo9QAAAQZ1wgoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODAMAAD3AWbjWWHIan8AAAELADZXAAAAAEUAAChHGgAAAQZXnQoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYEdUAAD2AU/fWWHI/n8AAAELAMoiAAAAAEUAACgWnQAAAQaIGgoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgAPwxAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOBb+AAD2AYDeWWDIfn8AAAELADZXAAAAAEUAACgR7AAAAQaMywoAAQoICAgIvlgAUAAAAAAA
+ AAAAUAIgALYgAAA=
+ summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOIKNAAD/ASMtCgABAX8AAAELAPmyAAAAAEUAACgRygAAAQaM7QoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOHk7AAD9AUckCgHnmn8AAAELAPmyAAAAAEUAACgZHQAAAQaFmgoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOHkEAAD8AY0yCvuhyX8AAAELAPmyAAAAAEUAAChagAAAAQZENwoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOEb4AAD7AcXtCvucGn8AAAELAPmyAAAAAEUAAChHjAAAAQZXKwoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOEeRAAD8AcNtCvudAX8AAAELAPmyAAAAAEUAAChcWwAAAQZCXAoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOFxtAAD7Ac9BCvd9VX8AAAELAPmyAAAAAEUAAChMHAAAAQZSmwoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODriAAD6Ac4bCvuhwn8AAAELAPmyAAAAAEUAACgmkQAAAQZ4JgoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOF6XAAD5AdG3Cmd8BX8AAAELAPmyAAAAAEUAACgk9gAAAQZ5wQoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOCwQAAD4AQFtCgGAPX8AAAELAPmyAAAAAEUAACh8tQAAAQYiAgoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOB0EAAD3AYVsCv4LTX8AAAELAPmyAAAAAEUAACh6oAAAAQYkFwoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOFVxAAD3AUF+WWHIan8AAAELAPmyAAAAAEUAACggTwAAAQZ+aAoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYDJ8AAD2AWS3WWHI/n8AAAELAGzNAAAAAEUAAChJIAAAAQZVlwoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgABzjAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAODLbAAD2AWT5WWDIhn8AAAELAPmyAAAAAEUAACgucgAAAQZwRQoAAQoICAgI+ZEBuwAAAAAA
+ AAAAUAIgAHl8AAA=
+ summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOIKPAAD/ASMrCgABAX8AAAELAGNSAAAAAEUAACg0TAAAAQZqawoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOEk/AAB+Ae4yCkjwAX8AAAELAGNSAAAAAEUAACgF/gAAAQaYuQoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOCihAAD9AZe+CgHnmn8AAAELAGNSAAAAAEUAACh8wgAAAQYh9QoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOH04AAD8AYj+CvuhyX8AAAELAGNSAAAAAEUAACg/7AAAAQZeywoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOGM+AAD7AamnCvucGn8AAAELAGNSAAAAAEUAAChmCwAAAQY4rAoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOApTAAD8AQCsCvudAX8AAAELAGNSAAAAAEUAAChHmQAAAQZXHgoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOBtSAAD7ARBdCvd9VX8AAAELAGNSAAAAAEUAACg1mAAAAQZpHwoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOHiXAAD6AZBmCvuhwn8AAAELAGNSAAAAAEUAAChv9gAAAQYuwQoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOGffAAD5AchvCmd8BX8AAAELAGNSAAAAAEUAAChZJQAAAQZFkgoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOCw9AAD4AQFACgGAPX8AAAELAGNSAAAAAEUAACh3CwAAAQYnrAoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOG8GAAD3ATNqCv4LTX8AAAELAGNSAAAAAEUAACgZRwAAAQaFcAoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOEBhAAD3AVaOWWHIan8AAAELAGNSAAAAAEUAACg5lAAAAQZlIwoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYDcVAAD2AWAeWWHI/n8AAAELAPvAAAAAAEUAACgjogAAAQZ7FQoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAPeOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOEneAAD2AU32WWDIhn8AAAELAGNSAAAAAEUAACgprwAAAQZ1CAoAAQoICAgIka3//wAAAAAA
+ AAAAUAIgAOMbAAA=
+ summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOIKIAAD/ASMyCgABAX8AAAELAHmgAAAAAEUAACiAgwAAAQYeNAoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODfVAAB+Af+cCkjwAX8AAAELAHmgAAAAAEUAAChPqAAAAQZPDwoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOAmvAAD9AbawCgHnmn8AAAELAHmgAAAAAEUAACgtrAAAAQZxCwoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOD0PAAD8AcknCvuhyX8AAAELAHmgAAAAAEUAAChHnAAAAQZXGwoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOArmAAD7AQIACvucGn8AAAELAHmgAAAAAEUAACh0ogAAAQYqFQoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAODC1AAD8AdpJCvudAX8AAAELAHmgAAAAAEUAAChQfAAAAQZOOwoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOAfoAAD7ASPHCvd9VX8AAAELAHmgAAAAAEUAAChSwQAAAQZL9goAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOEPGAAD6AcU3Cvuhwn8AAAELAHmgAAAAAEUAACg4kQAAAQZmJgoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOGK6AAD5Ac2UCmd8BX8AAAELAHmgAAAAAEUAACg8jwAAAQZiKAoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOC8sAAD4Af5QCgGAPX8AAAELAHmgAAAAAEUAACh6rgAAAQYkCQoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODMkAAD3AW9MCv4LTX8AAAELAHmgAAAAAEUAACg9EgAAAQZhpQoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOHHtAAD3ASUCWWHIan8AAAELAHmgAAAAAEUAAChrqQAAAQYzDgoAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYCipAAD2AW6KWWHI/n8AAAELAPcOAAAAAEUAACh+yQAAAQYf7goAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgABKPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOD/VAAD2AVf/WWDIhn8AAAELAHmgAAAAAEUAACgS3QAAAQaL2goAAQoICAgIe0kAFgAAAAAA
+ AAAAUAIgAPlpAAA=
+ summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOIKMAAD/ASMuCgABAX8AAAELAMqbAAAAAEUAAChzvgAAAQYq+QoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOADVAAB+ATadCkjwAX8AAAELAMqbAAAAAEUAACg27QAAAQZnygoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOBqVAAD9AaXKCgHnmn8AAAELAMqbAAAAAEUAACgbXgAAAQaDWQoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOEMTAAD8AcMjCvuhyX8AAAELAMqbAAAAAEUAAChdAwAAAQZBtAoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOBsqAAD7AfG7CvucGn8AAAELAMqbAAAAAEUAACh8VgAAAQYiYQoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOH3pAAD8AY0VCvudAX8AAAELAMqbAAAAAEUAACgIXwAAAQaWWAoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOE5BAAD7Ad1tCvd9VX8AAAELAMqbAAAAAEUAACheCQAAAQZArgoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOBdKAAD6AfGzCvuhwn8AAAELAMqbAAAAAEUAACgQywAAAQaN7AoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOGsMAAD5AcVCCmd8BX8AAAELAMqbAAAAAEUAACgcCwAAAQaCrAoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOBhtAAD4ARUQCgGAPX8AAAELAMqbAAAAAEUAAChCKQAAAQZcjgoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODzTAAD3AWWdCv4LTX8AAAELAMqbAAAAAEUAACgQXQAAAQaOWgoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOBI6AAD3AYS1WWHIan8AAAELAMqbAAAAAEUAACgkEAAAAQZ6pwoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOC3zAAD2AdEhPmV8QX8AAAELAMqbAAAAAEUAACgWyAAAAQaH7woAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAEplAAA=
+ summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYGwiAAD2ASsRWWHI/n8AAAELAGD1AAAAAEUAACg3JwAAAQZnkAoAAQoICAgIKekAewAAAAAA
+ AAAAUAIgAPmjAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOIKKAAD/ASMwCgABAX8AAAELANu1AAAAAEUAACi67wAAAQbjxwoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAODcjAAB+AQBPCkjwAX8AAAELANu1AAAAAEUAAChmjAAAAQY4KwoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOH8HAAD9AUFYCgHnmn8AAAELANu1AAAAAEUAACh5vwAAAQYk+AoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAODnqAAD8AcxMCvuhyX8AAAELANu1AAAAAEUAACgwaAAAAQZuTwoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAODG7AAD7AdsqCvucGn8AAAELANu1AAAAAEUAACgh4wAAAQZ81AoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOE65AAD8AbxFCvudAX8AAAELANu1AAAAAEUAACg+wwAAAQZf9AoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOFdRAAD7AdRdCvd9VX8AAAELANu1AAAAAEUAAChRbgAAAQZNSQoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOD3hAAD6AcscCvuhwn8AAAELANu1AAAAAEUAAChddAAAAQZBQwoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOF/GAAD5AdCICmd8BX8AAAELANu1AAAAAEUAACgOyQAAAQaP7goAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOE1DAAD4AeA5CgGAPX8AAAELANu1AAAAAEUAACgH0QAAAQaW5goAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOB+5AAD3AYK3Cv4LTX8AAAELANu1AAAAAEUAAChzbQAAAQYrSgoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOG1UAAD3ASmbWWHIan8AAAELANu1AAAAAEUAAChLowAAAQZTFAoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYBk2AAD2AX39WWHI/n8AAAELAE2eAAAAAEUAACgftQAAAQZ/AgoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAB4VAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOGuvAAD2ASx9WWDILn8AAAELANu1AAAAAEUAAChiigAAAQY8LQoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 89.96.200.46 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOCEtAAD0AX8mSA7TWX8AAAELANu1AAAAAEUAAChfEgAAAQY/pQoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 72.14.211.89 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOAUmAAD1AfLi0VXxXH8AAAELANu1AAAAAEWAACh3ggAAAQYmtQoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 209.85.241.92 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAqFe+AADwATcwSA7oTn8AAAELAE2eAAAAAEWAACh7bAAAAQYiywoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAB4VAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAC68AAIAQF7BKkB
+ summary: IP / ICMP 72.14.232.78 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOEWeAAD0AaZU0VX+cn8AAAELANu1AAAAAEWAAChsnAAAAQYxmwoAAQoICAgIGRUANQAAAAAA
+ AAAAUAIgAFt/AAA=
+ summary: IP / ICMP 209.85.254.114 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAALHw7AAArBvh3CAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALCVxAAArBk9CCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALGaKAAArBg4pCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALDqzAAArBjoACAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALEoqAAArBiqJCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALAhaAAArBmxZCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALCwbAAArBkiYCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALBfiAAArBlzRCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALChYAAArBkxbCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALGkeAAArBguVCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAALF+pAAArBhUKCAgICH8AAAEANRkVUFkhMQAAAAFgEqeUSrEAAAIEBZY=
+ summary: IP / TCP 8.8.8.8:domain > 127.0.0.1:nim_wan SA
+- - raw_packet: !!binary |
+ RQAAOIKOAAD/ASMsCgABAX8AAAELAPNSAAAAAEUAACjlPQAAAQa5eQoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOFrfAAD9AWWACgHnmn8AAAELAPNSAAAAAEUAACgEFAAAAQaaowoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOEvyAAD8AbpECvuhyX8AAAELAPNSAAAAAEUAACh2JwAAAQYokAoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOEoVAAD7AcLQCvucGn8AAAELAPNSAAAAAEUAAChWaQAAAQZITgoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOGOZAAD8AadlCvudAX8AAAELAPNSAAAAAEUAAChLfgAAAQZTOQoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RcAAOCkEAAD7AQKrCvd9VX8AAAELAPNSAAAAAEUAAChKTwAAAQZUaAoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOHL8AAD6AZYBCvuhwn8AAAELAPNSAAAAAEUAAChGKwAAAQZYjAoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOCBNAAD5ARACCmd8BX8AAAELAPNSAAAAAEUAACgaHwAAAQaEmAoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOF3sAAD4Ac+QCgGAPX8AAAELAPNSAAAAAEUAACgV/QAAAQaIugoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOCBhAAD3AYIPCv4LTX8AAAELAPNSAAAAAEUAAChuGQAAAQYwngoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOFcAAAD3AT/vWWHIan8AAAELAPNSAAAAAEUAACgTdQAAAQaLQgoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAYEpQAAD2AUzjWWHI/n8AAAELAJUsAAAAAEUAAChxMAAAAQYthwoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAO4jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOAxnAAD2AfKtPmV8QX8AAAELAPNSAAAAAEUAACgBDgAAAQadqQoAAQoICAgI4hwfkAAAAAAA
+ AAAAUAIgAHMcAAA=
+ summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / TCPerror
+- - raw_packet: !!binary |
+ RQAAOIKRAAD/ASMpCgABAX8AAAELABAzAAAAAEUAABwvFgAAARFvogoAAQoICAgIqwYAFwAIOac=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFNsAAB+AeQFCkjwAX8AAAELAANFAAAAAEUAABw5ngAAARFlGgoAAQoICAgIqwYAFwAIRpU=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOHE6AAD9AU8lCgHnmn8AAAELAANFAAAAAEUAABxGtgAAARFYAgoAAQoICAgIqwYAFwAIRpU=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAODDfAAD8AdVXCvuhyX8AAAELAANFAAAAAEUAABxWXQAAARFIWwoAAQoICAgIqwYAFwAIRpU=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOHMbAAD7AZnKCvucGn8AAAELAANFAAAAAEUAABwFUAAAARGZaAoAAQoICAgIqwYAFwAIRpU=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOBQ5AAD8AfbFCvudAX8AAAELAANFAAAAAEUAABx9aQAAAREhTwoAAQoICAgIqwYAFwAIRpU=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOBMIAAD7ARinCvd9VX8AAAELANyRAAAAAEUAABwqfQAAARF0OwoAAQoICAgIqwYAFwAIbUg=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFPQAAD6AbUtCvuhwn8AAAELANyRAAAAAEUAABwGygAAARGX7goAAQoICAgIqwYAFwAIbUg=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOCzvAAD5AQNgCmd8BX8AAAELANyRAAAAAEUAABwnsAAAARF3CAoAAQoICAgIqwYAFwAIbUg=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOArqAAD4ASKTCgGAPX8AAAELANyRAAAAAEUAABwXygAAARGG7goAAQoICAgIqwYAFwAIbUg=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOC5tAAD3AXQDCv4LTX8AAAELANyRAAAAAEUAABwUwgAAARGJ9goAAQoICAgIqwYAFwAIbUg=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOCujAAD3AWtMWWHIan8AAAELANyRAAAAAEUAABxoVgAAARE2YgoAAQoICAgIqwYAFwAIbUg=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYAbjAAD2AZBQWWHI/n8AAAELANyRAAAAAEUAABx9VQAAAREhYwoAAQoICAgIqwYAFwAIbUgA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOCEkAAD2Ad3wPmV8QX8AAAELANyRAAAAAEUAABw+mwAAARFgHQoAAQoICAgIqwYAFwAIbUg=
+ summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOIKTAAD/ASMnCgABAX8AAAELABAzAAAAAEUAABwyEQAAARFspwoAAQoICAgIXY8AUAAIhuU=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOE9OAAD9AXERCgHnmn8AAAELAANFAAAAAEUAABxMDAAAARFSrAoAAQoICAgIXY8AUAAIk9M=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOHJUAAB+AcUdCkjwAX8AAAELAANFAAAAAEUAABwhEwAAARF9pQoAAQoICAgIXY8AUAAIk9M=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOBp0AAD8AevCCvuhyX8AAAELAANFAAAAAEUAABwb5AAAARGC1AoAAQoICAgIXY8AUAAIk9M=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOFjeAAD7AbQHCvucGn8AAAELAANFAAAAAEUAABwB+QAAARGcvwoAAQoICAgIXY8AUAAIk9M=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOHRxAAD8AZaNCvudAX8AAAELAANFAAAAAEUAABwLEAAAARGTqAoAAQoICAgIXY8AUAAIk9M=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOFq4AAD7AdD2Cvd9VX8AAAELANyRAAAAAEUAABw11wAAARFo4QoAAQoICAgIXY8AUAAIuoY=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFKyAAD6AbZLCvuhwn8AAAELANyRAAAAAEUAABxcnwAAARFCGQoAAQoICAgIXY8AUAAIuoY=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOHqHAAD5AbXHCmd8BX8AAAELANyRAAAAAEUAABwHlAAAARGXJAoAAQoICAgIXY8AUAAIuoY=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFQMAAD4AdlwCgGAPX8AAAELANyRAAAAAEUAABw7uQAAARFi/woAAQoICAgIXY8AUAAIuoY=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOALXAAD3AZ+ZCv4LTX8AAAELANyRAAAAAEUAABxbqQAAARFDDwoAAQoICAgIXY8AUAAIuoY=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAODYEAAD3AWDrWWHIan8AAAELANyRAAAAAEUAABxiqwAAARE8DQoAAQoICAgIXY8AUAAIuoY=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYHabAAD2ASCYWWHI/n8AAAELANyRAAAAAEUAABxGQwAAARFYdQoAAQoICAgIXY8AUAAIuoYA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOHBeAAD2ASfOWWDILn8AAAELANyRAAAAAEUAABxWUQAAARFIZwoAAQoICAgIXY8AUAAIuoY=
+ summary: IP / ICMP 89.96.200.46 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOIKVAAD/ASMlCgABAX8AAAELABAzAAAAAEUAABwahgAAARGEMgoAAQoICAgIPaYBuwAIpWM=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOE8ZAAB+AehYCkjwAX8AAAELAANFAAAAAEUAABwUagAAARGKTgoAAQoICAgIPaYBuwAIslE=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOFOeAAD9AWzBCgHnmn8AAAELAANFAAAAAEUAABxKrQAAARFUCwoAAQoICAgIPaYBuwAIslE=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAODmqAAD8AcyMCvuhyX8AAAELAANFAAAAAEUAABxPPQAAARFPewoAAQoICAgIPaYBuwAIslE=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOFLIAAD7AbodCvucGn8AAAELAANFAAAAAEUAABxYFAAAARFGpAoAAQoICAgIPaYBuwAIslE=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOCJoAAD8AeiWCvudAX8AAAELAANFAAAAAEUAABxVHgAAARFJmgoAAQoICAgIPaYBuwAIslE=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOA5xAAD7AR0+Cvd9VX8AAAELANyRAAAAAEUAABw7RgAAARFjcgoAAQoICAgIPaYBuwAI2QQ=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAODo7AAD6Ac7CCvuhwn8AAAELANyRAAAAAEUAABx72QAAAREi3woAAQoICAgIPaYBuwAI2QQ=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOAeMAAD5ASjDCmd8BX8AAAELANyRAAAAAEUAABxiTwAAARE8aQoAAQoICAgIPaYBuwAI2QQ=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOGPpAAD4AcmTCgGAPX8AAAELANyRAAAAAEUAABxQHQAAARFOmwoAAQoICAgIPaYBuwAI2QQ=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOAndAAD3AZiTCv4LTX8AAAELANyRAAAAAEUAABxzpQAAARErEwoAAQoICAgIPaYBuwAI2QQ=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFgXAAD3AT7YWWHIan8AAAELANyRAAAAAEUAABxnRwAAARE3cQoAAQoICAgIPaYBuwAI2QQ=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYFGuAAD2AUWFWWHI/n8AAAELANyRAAAAAEUAABxq/QAAAREzuwoAAQoICAgIPaYBuwAI2QQA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOFZTAAD2AajBPmV8QX8AAAELANyRAAAAAEUAABwEFQAAARGaowoAAQoICAgIPaYBuwAI2QQ=
+ summary: IP / ICMP 62.101.124.65 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOIKXAAD/ASMjCgABAX8AAAELABAzAAAAAEUAABwTtAAAARGLBAoAAQoICAgIKu///wAIudU=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOEQZAAB+AfNYCkjwAX8AAAELAANFAAAAAEUAABxJIQAAARFVlwoAAQoICAgIKu///wAIxsM=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOFUpAAD9AWs2CgHnmn8AAAELAANFAAAAAEUAABwFwQAAARGY9woAAQoICAgIKu///wAIxsM=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOGsKAAD8AZssCvuhyX8AAAELAANFAAAAAEUAABxCgQAAARFcNwoAAQoICAgIKu///wAIxsM=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOAmpAAD7AQM9CvucGn8AAAELAANFAAAAAEUAABwYIAAAARGGmAoAAQoICAgIKu///wAIxsM=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOGCXAAD8AapnCvudAX8AAAELAANFAAAAAEUAABwTKgAAARGLjgoAAQoICAgIKu///wAIxsM=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOBOTAAD7ARgcCvd9VX8AAAELANyRAAAAAEUAABwVJwAAARGJkQoAAQoICAgIKu///wAI7XY=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAODC3AAD6AdhGCvuhwn8AAAELANyRAAAAAEUAABxDtQAAARFbAwoAAQoICAgIKu///wAI7XY=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAODedAAD5AfixCmd8BX8AAAELANyRAAAAAEUAABxN4QAAARFQ1woAAQoICAgIKu///wAI7XY=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFx1AAD4AdEHCgGAPX8AAAELANyRAAAAAEUAABw0gwAAARFqNQoAAQoICAgIKu///wAI7XY=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOHArAAD3ATJFCv4LTX8AAAELANyRAAAAAEUAABwNQgAAARGRdgoAAQoICAgIKu///wAI7XY=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOEe3AAD3AU84WWHIan8AAAELANyRAAAAAEUAABwZfgAAARGFOgoAAQoICAgIKu///wAI7XY=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYFc0AAD2AT//WWHI/n8AAAELANyRAAAAAEUAABwz2wAAARFq3QoAAQoICAgIKu///wAI7XYA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAODTWAAD2AWNWWWDILn8AAAELANyRAAAAAEUAABxoqgAAARE2DgoAAQoICAgIKu///wAI7XY=
+ summary: IP / ICMP 89.96.200.46 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOIKQAAD/ASMqCgABAX8AAAELABAzAAAAAEUAABxylwAAAREsIQoAAQoICAgIO4EAFgAIqS0=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOCCDAAD9AZ/cCgHnmn8AAAELAANFAAAAAEUAABxqEAAAARE0qAoAAQoICAgIO4EAFgAIths=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOHMJAAB+AcRoCkjwAX8AAAELAANFAAAAAEUAABxhYgAAARE9VgoAAQoICAgIO4EAFgAIths=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOHFtAAD8AZTJCvuhyX8AAAELAANFAAAAAEUAABxsUwAAAREyZQoAAQoICAgIO4EAFgAIths=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOCG0AAD7AesxCvucGn8AAAELAANFAAAAAEUAABw13gAAARFo2goAAQoICAgIO4EAFgAIths=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOGzBAAD8AZ49CvudAX8AAAELAANFAAAAAEUAABxULwAAARFKiQoAAQoICAgIO4EAFgAIths=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOGVtAAD7AcZBCvd9VX8AAAELANyRAAAAAEUAABwlYwAAARF5VQoAAQoICAgIO4EAFgAI3M4=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAODepAAD6AdFUCvuhwn8AAAELANyRAAAAAEUAABwplgAAARF1IgoAAQoICAgIO4EAFgAI3M4=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOHKlAAD5Ab2pCmd8BX8AAAELANyRAAAAAEUAABwebwAAARGASQoAAQoICAgIO4EAFgAI3M4=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOD0XAAD4AfBlCgGAPX8AAAELANyRAAAAAEUAABwUBgAAARGKsgoAAQoICAgIO4EAFgAI3M4=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOD9VAAD3AWMbCv4LTX8AAAELANyRAAAAAEUAABxcmwAAARFCHQoAAQoICAgIO4EAFgAI3M4=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOBGoAAD3AYVHWWHIan8AAAELANyRAAAAAEUAABw3TAAAARFnbAoAAQoICAgIO4EAFgAI3M4=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYENwAAD2AVPDWWHI/n8AAAELANyRAAAAAEUAABw0HwAAARFqmQoAAQoICAgIO4EAFgAI3M4A
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOEnSAAD2AU4KWWDIfn8AAAELANyRAAAAAEUAABwrHAAAARFznAoAAQoICAgIO4EAFgAI3M4=
+ summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOIKUAAD/ASMmCgABAX8AAAELABAzAAAAAEUAAByqJgAAARH0kQoAAQoICAgIc54AewAIcKs=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOE82AAB+Aeg7CkjwAX8AAAELAANFAAAAAEUAABxr8AAAAREyyAoAAQoICAgIc54AewAIfZk=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOG3VAAD9AVKKCgHnmn8AAAELAANFAAAAAEUAABx19QAAAREowwoAAQoICAgIc54AewAIfZk=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOCIYAAD8AeQeCvuhyX8AAAELAANFAAAAAEUAABwhzQAAARF86woAAQoICAgIc54AewAIfZk=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOGbTAAD7AaYSCvucGn8AAAELAANFAAAAAEUAABwbvQAAARGC+woAAQoICAgIc54AewAIfZk=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOD1WAAD8Ac2oCvudAX8AAAELAANFAAAAAEUAABwr9QAAARFywwoAAQoICAgIc54AewAIfZk=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOH6cAAD7Aa0SCvd9VX8AAAELANyRAAAAAEUAABxJwwAAARFU9QoAAQoICAgIc54AewAIpEw=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOCzzAAD6AdwKCvuhwn8AAAELANyRAAAAAEUAABwhMAAAARF9iAoAAQoICAgIc54AewAIpEw=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOGwyAAD5AcQcCmd8BX8AAAELANyRAAAAAEUAABwlAQAAARF5twoAAQoICAgIc54AewAIpEw=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOB9UAAD4AQ4pCgGAPX8AAAELANyRAAAAAEUAABwZwAAAARGE+AoAAQoICAgIc54AewAIpEw=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOAEzAAD3AaE9Cv4LTX8AAAELANyRAAAAAEUAABxWVgAAARFIYgoAAQoICAgIc54AewAIpEw=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOEZsAAD3AVCDWWHIan8AAAELANyRAAAAAEUAABwVYgAAARGJVgoAAQoICAgIc54AewAIpEw=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYBbkAAD2AYBPWWHI/n8AAAELANyRAAAAAEUAABx+9wAAAREfwQoAAQoICAgIc54AewAIpEwA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOBWnAAD2AYI1WWDIfn8AAAELANyRAAAAAEUAABxpoQAAARE1FwoAAQoICAgIc54AewAIpEw=
+ summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOIKYAAD/ASMiCgABAX8AAAELAPT/AAAAAEUAABzb1QAAAQHC8goAAQoICAgICAD3/wAAAAA=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAOHlSAAB+Ab4fCkjwAX8AAAELAJBjAAAAAEUAABxRTgAAAQFNegoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RcAAOCJxAAD9AZ3uCgHnmn8AAAELAJBjAAAAAEUAABwuRwAAAQFwgQoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RcAAOAkgAAD8Af0WCvuhyX8AAAELAJBjAAAAAEUAABxwFwAAAQEusQoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RcAAODfFAAD7AdUgCvucGn8AAAELAJBjAAAAAEUAABxTpQAAAQFLIwoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RcAAOD5TAAD8AcyrCvudAX8AAAELAJBjAAAAAEUAABwyrQAAAQFsGwoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RcAAOBEIAAD7ARqnCvd9VX8AAAELAJBjAAAAAEUAABwYRwAAAQGGgQoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAOC3cAAD6AdshCvuhwn8AAAELAJBjAAAAAEUAABwg9gAAAQF90goAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAOCthAAD5AQTuCmd8BX8AAAELAJBjAAAAAEUAABwaNQAAAQGEkwoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAODD8AAD4AfyACgGAPX8AAAELAJBjAAAAAEUAABwhdgAAAQF9UgoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAODi3AAD3AWm5Cv4LTX8AAAELAJBjAAAAAEUAABwoFAAAAQF2tAoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAOB6fAAD3AXhQWWHIan8AAAELAJBjAAAAAEUAABwC/gAAAQGbygoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAYHGYAAD2ASWbWWHI/n8AAAELAJBjAAAAAEUAABxc4wAAAQFB5QoAAQoICAgICABcnAAAAAAA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOEnfAAD2AU39WWDIfn8AAAELAJBjAAAAAEUAABwDBwAAAQGbwQoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAODaSAAD2AWfjSA7TN38AAAELAJBjAAAAAEUAABxRwAAAAQFNCAoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 72.14.211.55 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAOEIPAAD1AbX50VXxXH8AAAELAJBjAAAAAEWAABxj+gAAAQE6TgoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 209.85.241.92 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAqBEjAADwAX3LSA7oTn8AAAELAJBjAAAAAEWAABwY8AAAAQGFWAoAAQoICAgICABcnAAAAAAA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIADZJgAIAQFczqkB
+ summary: IP / ICMP 72.14.232.78 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOEMpAADxAavH0VX+dH8AAAELAJBjAAAAAEWAABw+9gAAAQFfUgoAAQoICAgICABcnAAAAAA=
+ summary: IP / ICMP 209.85.254.116 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / ICMPerror
+- - raw_packet: !!binary |
+ RQAAHAV3AAArAW9RCAgICH8AAAEAAP//AAAAAA==
+ summary: IP / ICMP 8.8.8.8 > 127.0.0.1 echo-reply 0
+- - raw_packet: !!binary |
+ RQAAHAJwAAArAXJYCAgICH8AAAEAAP//AAAAAA==
+ summary: IP / ICMP 8.8.8.8 > 127.0.0.1 echo-reply 0
+- - raw_packet: !!binary |
+ RQAAOIKSAAD/ASMoCgABAX8AAAELABAzAAAAAEUAABz9GQAAARGhngoAAQoICAgIJAYANQAIwIk=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAODjdAAD9AYeCCgHnmn8AAAELAANFAAAAAEUAABxkigAAARE6LgoAAQoICAgIJAYANQAIzXc=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAODaTAAD8Ac+jCvuhyX8AAAELAANFAAAAAEUAABwL2wAAARGS3QoAAQoICAgIJAYANQAIzXc=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOBigAAD7AfRFCvucGn8AAAELAANFAAAAAEUAABxTSQAAARFLbwoAAQoICAgIJAYANQAIzXc=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOEegAAD8AcNeCvudAX8AAAELAANFAAAAAEUAABwXpgAAARGHEgoAAQoICAgIJAYANQAIzXc=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOF63AAD7Acz3Cvd9VX8AAAELANyRAAAAAEUAABw6EgAAARFkpgoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAODCFAAB+AQbtCkjwAX8AAAELAANFAAAAAEUAABwq2QAAARFz3woAAQoICAgIJAYANQAIzXc=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFQoAAD6AbTVCvuhwn8AAAELANyRAAAAAEUAABwOIgAAARGQlgoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOAyAAAD5ASPPCmd8BX8AAAELANyRAAAAAEUAABxhaAAAARE9UAoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOAFtAAD4ASwQCgGAPX8AAAELANyRAAAAAEUAABxNUwAAARFRZQoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFSiAAD3AU3OCv4LTX8AAAELANyRAAAAAEUAABw9YgAAARFhVgoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOEjBAAD3AU4uWWHIan8AAAELANyRAAAAAEUAABxokQAAARE2JwoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYG2bAAD2ASmYWWHI/n8AAAELANyRAAAAAEUAABx07gAAAREpygoAAQoICAgIJAYANQAI9CoA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOGhGAAD0ATgNSA7TWX8AAAELANyRAAAAAEUAABxZhwAAARFFMQoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 72.14.211.89 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOCFhAADyAdml0VXxXn8AAAELANyRAAAAAEWAABwSvgAAARGLegoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 209.85.241.94 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOEivAAD2AU8tWWDIfn8AAAELANyRAAAAAEUAABxjEwAAARE7pQoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 89.96.200.126 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAqAQMAADzAYfkSA7oTH8AAAELANyRAAAAAEWAABw3RQAAARFm8woAAQoICAgIJAYANQAI9CoA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAsVwAIAQGJnikB
+ summary: IP / ICMP 72.14.232.76 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOB9EAAD0Acyw0VX+cH8AAAELANyRAAAAAEWAABwwgAAAARFtuAoAAQoICAgIJAYANQAI9Co=
+ summary: IP / ICMP 209.85.254.112 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOIKWAAD/ASMkCgABAX8AAAELABAzAAAAAEUAABw/owAAARFfFQoAAQoICAgISZgfkAAIe5w=
+ summary: IP / ICMP 10.0.1.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOFSYAAB+AeLZCkjwAX8AAAELAANFAAAAAEUAABw45QAAARFl0woAAQoICAgISZgfkAAIiIo=
+ summary: IP / ICMP 10.72.240.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOGbxAAD9AVluCgHnmn8AAAELAANFAAAAAEUAABwTpAAAARGLFAoAAQoICAgISZgfkAAIiIo=
+ summary: IP / ICMP 10.1.231.154 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOE4qAAD8AbgMCvuhyX8AAAELAANFAAAAAEUAABwCWgAAARGcXgoAAQoICAgISZgfkAAIiIo=
+ summary: IP / ICMP 10.251.161.201 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOAoSAAD7AQLUCvucGn8AAAELAANFAAAAAEUAABwlRgAAARF5cgoAAQoICAgISZgfkAAIiIo=
+ summary: IP / ICMP 10.251.156.26 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOArZAAD8AQAmCvudAX8AAAELAANFAAAAAEUAABxmogAAARE4FgoAAQoICAgISZgfkAAIiIo=
+ summary: IP / ICMP 10.251.157.1 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RcAAOFSsAAD7AdcCCvd9VX8AAAELANyRAAAAAEUAABxb5gAAARFC0goAAQoICAgISZgfkAAIrz0=
+ summary: IP / ICMP 10.247.125.85 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOEXfAAD6AcMeCvuhwn8AAAELANyRAAAAAEUAABwyUQAAARFsZwoAAQoICAgISZgfkAAIrz0=
+ summary: IP / ICMP 10.251.161.194 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOBG3AAD5AR6YCmd8BX8AAAELANyRAAAAAEUAABwhUQAAARF9ZwoAAQoICAgISZgfkAAIrz0=
+ summary: IP / ICMP 10.103.124.5 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOGqaAAD4AcLiCgGAPX8AAAELANyRAAAAAEUAABxRkQAAARFNJwoAAQoICAgISZgfkAAIrz0=
+ summary: IP / ICMP 10.1.128.61 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAODJzAAD3AW/9Cv4LTX8AAAELANyRAAAAAEUAABxrGQAAAREznwoAAQoICAgISZgfkAAIrz0=
+ summary: IP / ICMP 10.254.11.77 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAOA3LAAD3AYkkWWHIan8AAAELANyRAAAAAEUAABwaIAAAARGEmAoAAQoICAgISZgfkAAIrz0=
+ summary: IP / ICMP 89.97.200.106 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+- - raw_packet: !!binary |
+ RQAAYGx9AAD2ASq2WWHI/n8AAAELANyRAAAAAEUAABwmjgAAARF4KgoAAQoICAgISZgfkAAIrz0A
+ AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+ summary: IP / ICMP 89.97.200.254 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror / Padding
+- - raw_packet: !!binary |
+ RQAAOB9FAAD2AXiPWWDIhn8AAAELANyRAAAAAEUAABwPIwAAARGPlQoAAQoICAgISZgfkAAIrz0=
+ summary: IP / ICMP 89.96.200.134 > 127.0.0.1 time-exceeded ttl-zero-during-transit
+ / IPerror / UDPerror
+input: null
+max_ttl: 30
+sent_packets:
+- - raw_packet: !!binary |
+ RQAAKFw+AAABBs6BfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
+ summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
+- - raw_packet: !!binary |
+ RQAAKJOnAAACBpYYfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
+ summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
+- - raw_packet: !!binary |
+ RQAAKJHqAAADBpbVfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
+ summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
+- - raw_packet: !!binary |
+ RQAAKBF+AAAEBhZCfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
+ summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
+- - raw_packet: !!binary |
+ RQAAKOzMAAAFBjnzfwAAAQgICAiDDgAAAAAAAAAAAABQAiAAfcMAAA==
+ summary: IP / TCP 127.0.0.1:33550 > 8.8.8.8:0 S
+- - raw_packet: !!binary |
+ RQAAKFSQAAABBtYvfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKIDRAAACBqjufwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKLfnAAADBnDYfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKDn1AAAEBu3KfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKLfdAAAFBm7ifwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKOvCAAAGBjn9fwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKOK/AAAHBkIAfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKLztAAAIBmbSfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKAzkAAAJBhXcfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKDFvAAAKBvBQfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKOEmAAALBj+ZfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKFMvAAAMBsyQfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKMN6AAANBltFfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKG0nAAAOBrCYfwAAAQgICAgT6QAXAAAAAAAAAABQAiAA7NEAAA==
+ summary: IP / TCP 127.0.0.1:5097 > 8.8.8.8:telnet S
+- - raw_packet: !!binary |
+ RQAAKHbiAAABBrPdfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKGakAAACBsMbfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKEY6AAADBuKFfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKB2mAAAEBgoafwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKMM1AAAFBmOKfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKCInAAAGBgOZfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKDT8AAAHBu/DfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKALhAAAIBiDffwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKGNpAAAJBr9WfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKOoKAAAKBje1fwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKNFAAAALBk9/fwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKNCoAAAMBk8XfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKPa+AAANBigBfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKI+PAAAOBo4wfwAAAQgICAi+WABQAAAAAAAAAABQAiAAQikAAA==
+ summary: IP / TCP 127.0.0.1:48728 > 8.8.8.8:http S
+- - raw_packet: !!binary |
+ RQAAKBHKAAABBhj2fwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKHwXAAACBq2ofwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKOu2AAADBj0JfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKCrXAAAEBvzofwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKAjxAAAFBh3PfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKABrAAAGBiVVfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKPZ9AAAHBi5CfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKHDaAAAIBrLlfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKEstAAAJBteSfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKM77AAAKBlLEfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKD9mAAALBuFZfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKHghAAAMBqeefwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKHPmAAANBqrZfwAAAQgICAj5kQG7AAAAAAAAAABQAiAABYUAAA==
+ summary: IP / TCP 127.0.0.1:63889 > 8.8.8.8:https S
+- - raw_packet: !!binary |
+ RQAAKDRMAAABBvZzfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKE9xAAACBtpOfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKPf1AAADBjDKfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKD89AAAEBuiCfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKLQcAAAFBnKjfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKIQOAAAGBqGxfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKCaJAAAHBv42fwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKOHXAAAIBkHofwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKOJcAAAJBkBjfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKB1MAAAKBgR0fwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKNSbAAALBkwkfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKKgHAAAMBne4fwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKJsTAAANBoOsfwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKN2lAAAOBkAafwAAAQgICAiRrf//AAAAAAAAAABQAiAAbyQAAA==
+ summary: IP / TCP 127.0.0.1:37293 > 8.8.8.8:65535 S
+- - raw_packet: !!binary |
+ RQAAKICDAAABBqo8fwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKAdOAAACBiJyfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKK/mAAADBnjZfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKDrnAAAEBuzYfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKED8AAAFBuXDfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKC/2AAAGBvXJfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKNPSAAAHBlDtfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKK8cAAAIBnSjfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKCjAAAAJBvn/fwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKBsiAAAKBgaefwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKBzHAAALBgP5fwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKNJzAAAMBk1MfwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKFORAAANBssufwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKAQSAAAOBhmufwAAAQgICAh7SQAWAAAAAAAAAABQAiAAhXIAAA==
+ summary: IP / TCP 127.0.0.1:31561 > 8.8.8.8:ssh S
+- - raw_packet: !!binary |
+ RQAAKHO+AAABBrcBfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKOH2AAACBkfJfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKBSMAAADBhQ0fwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKMRzAAAEBmNMfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKBnkAAAFBgzcfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKKVKAAAGBoB1fwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKOSdAAAHBkAifwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKFpKAAAIBsl1fwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKO//AAAJBjLAfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKNahAAAKBksefwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKFp7AAALBsZEfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKAA8AAAMBh+EfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKJGTAAANBo0sfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKH97AAAOBp5EfwAAAQgICAgp6QB7AAAAAAAAAABQAiAA1m0AAA==
+ summary: IP / TCP 127.0.0.1:10729 > 8.8.8.8:ntp S
+- - raw_packet: !!binary |
+ RQAAKLrvAAABBm/QfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKGt6AAACBr5FfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKMpXAAADBl5ofwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKJWZAAAEBpImfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKNMhAAAFBlOefwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKNVIAAAGBlB3fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKL1bAAAHBmdkfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKIiDAAAIBps8fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKINsAAAJBp9TfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKOAbAAAKBkGkfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKNldAAALBkdifwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKNSEAAAMBks7fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKPsJAAANBiO2fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKNXHAAAOBkf4fwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKP+lAAAPBh0afwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKFKwAAAQBskPfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKIngAAARBpDffwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKGkqAAASBrCVfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKPzhAAATBhvefwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKC7oAAAUBujXfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKJGvAAAVBoUQfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKL4+AAAWBleBfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKBY+AAAXBv6BfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKOsMAAAYBiizfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKPBTAAAZBiJsfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKFnUAAAaBrfrfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKCPlAAAbBuzafwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKAW7AAAcBgoFfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKAbRAAAdBgfvfwAAAQgICAgZFQA1AAAAAAAAAABQAiAA54cAAA==
+ summary: IP / TCP 127.0.0.1:nim_wan > 8.8.8.8:domain S
+- - raw_packet: !!binary |
+ RQAAKOU9AAABBkWCfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKNFOAAACBlhxfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKES6AAADBuQFfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKFqUAAAEBs0rfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKKHtAAAFBoTSfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKMIXAAAGBmOofwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKBphAAAHBgpffwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKMb7AAAIBlzEfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKMoDAAAJBli8fwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKMjKAAAKBlj1fwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKBj7AAALBgfFfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKAyCAAAMBhM+fwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAKOF2AAANBj1JfwAAAQgICAjiHB+QAAAAAAAAAABQAiAA/yQAAA==
+ summary: IP / TCP 127.0.0.1:57884 > 8.8.8.8:http_alt S
+- - raw_packet: !!binary |
+ RQAAHC8WAAABEfuqfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHAJCAAACESd/fwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHIQuAAADEaSSfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHIXkAAAEEaHcfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHPTkAAAFETHcfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHH1mAAAGEahafwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHBr3AAAHEQnKfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHB4VAAAIEQWsfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHEOxAAAJEd8PfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHLfFAAAKEWn7fwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHEJ8AAALEd5EfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHEmwAAAMEdYQfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHPOaAAANESsmfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHCQqAAAOEfmWfwAAAQgICAirBgAXAAjFrw==
+ summary: IP / UDP 127.0.0.1:43782 > 8.8.8.8:telnet
+- - raw_packet: !!binary |
+ RQAAHDIRAAABEfivfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHKViAAACEYRefwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHBDAAAADERgBfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHIOvAAAEEaQRfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHNa1AAAFEVALfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHEkaAAAGEdymfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHHEFAAAHEbO7fwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHG+qAAAIEbQWfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHLRcAAAJEW5kfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHO71AAAKETLLfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHD0DAAALEeO9fwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHJAkAAAMEY+cfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHNlvAAANEUVRfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHECQAAAOEd0wfwAAAQgICAhdjwBQAAgS7g==
+ summary: IP / UDP 127.0.0.1:23951 > 8.8.8.8:http
+- - raw_packet: !!binary |
+ RQAAHBqGAAABERA7fwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHLTJAAACEXT3fwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHNdaAAADEVFmfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHGUXAAAEEcKpfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHNbNAAAFEU/zfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHCrmAAAGEfrafwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHBmqAAAHEQsXfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHO0hAAAIETaffwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHF5DAAAJEcR9fwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHMFJAAAKEWB3fwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHAqRAAALERYwfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHDaAAAAMEelAfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHOYzAAANETiNfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHH0cAAAOEaCkfwAAAQgICAg9pgG7AAgxbA==
+ summary: IP / UDP 127.0.0.1:15782 > 8.8.8.8:https
+- - raw_packet: !!binary |
+ RQAAHBO0AAABERcNfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHELQAAACEebwfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHCQNAAADEQS0fwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHEy+AAAEEdsCfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHFnEAAAFEcz8fwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHDD4AAAGEfTIfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHFfLAAAHEcz1fwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHFtXAAAIEchpfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHD2gAAAJEeUgfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHM/GAAAKEVH6fwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHNDXAAALEU/pfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHIwIAAAMEZO4fwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHEOjAAANEdsdfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHHHdAAAOEavjfwAAAQgICAgq7///AAhF3g==
+ summary: IP / UDP 127.0.0.1:10991 > 8.8.8.8:65535
+- - raw_packet: !!binary |
+ RQAAHHKXAAABEbgpfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHBVFAAACERR8fwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHB2zAAADEQsOfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHCsLAAAEEfy1fwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHM8mAAAFEVeafwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHH1/AAAGEahBfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHLcgAAAHEW2gfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHA8LAAAIERS2fwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHFuuAAAJEccSfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHBjXAAAKEQjqfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHOKqAAALET4WfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHCtvAAAMEfRRfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHOb2AAANETfKfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHNZ4AAAOEUdIfwAAAQgICAg7gQAWAAg1Ng==
+ summary: IP / UDP 127.0.0.1:15233 > 8.8.8.8:ssh
+- - raw_packet: !!binary |
+ RQAAHKomAAABEYCafwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHJzvAAACEYzRfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHHyAAAADEaxAfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHBx6AAAEEQtHfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHCdcAAAFEf9kfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHKblAAAGEX7bfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHJ9dAAAHEYVjfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHBPTAAAIEQ/ufwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHM2WAAAJEVUqfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHH05AAAKEaSHfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHHATAAALEbCtfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHMwRAAAMEVOvfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHFCmAAANEc4afwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHEq/AAAOEdMBfwAAAQgICAhzngB7AAj8sw==
+ summary: IP / UDP 127.0.0.1:29598 > 8.8.8.8:ntp
+- - raw_packet: !!binary |
+ RQAAHNvVAAABAU77fwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHJnCAAACAZAOfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHEhLAAADAeCFfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHPG/AAAEATYRfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHEvQAAAFAdsAfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHNROAAAGAVGCfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHG+aAAAHAbU2fwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHGw6AAAIAbeWfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHE23AAAJAdUZfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHETwAAAKAdzgfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHMl5AAALAVdXfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHEEkAAAMAd6sfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHOLVAAANATv7fwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHPtzAAAOASJdfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHKv2AAAPAXDafwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHJ4aAAAQAX22fwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHJmQAAARAYFAfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHM9gAAASAUpwfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHF87AAATAbmVfwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHJOVAAAUAYQ7fwAAAQgICAgIAPf/AAAAAA==
+ summary: IP / ICMP 127.0.0.1 > 8.8.8.8 echo-request 0
+- - raw_packet: !!binary |
+ RQAAHP0ZAAABES2nfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHCrQAAACEf7wfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHHnUAAADEa7sfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHH4+AAAEEamCfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHPc4AAAFES+IfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHN53AAAGEUdJfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHFi/AAAHEcwBfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHM4nAAAIEVWZfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHP0vAAAJESWRfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHJmRAAAKEYgvfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHIqdAAALEZYjfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHPJhAAAMES1ffwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHHdGAAANEad6fwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHPTYAAAOESjofwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHFvwAAAPEcDQfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHP3zAAAQER3NfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHGCzAAAREboNfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHIHZAAASEZfnfwAAAQgICAgkBgA1AAhMkg==
+ summary: IP / UDP 127.0.0.1:teamcoherence > 8.8.8.8:domain
+- - raw_packet: !!binary |
+ RQAAHD+jAAABEesdfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHEMVAAACEearfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHPV4AAADETNIfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHPWLAAAEETI1fwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHLphAAAFEWxffwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHGAvAAAGEcWRfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHMi1AAAHEVwLfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHN7VAAAIEUTrfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHJmkAAAJEYkcfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHBSfAAAKEQ0ifwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHOLfAAALET3hfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHL25AAAMEWIHfwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHG7hAAANEa/ffwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+- - raw_packet: !!binary |
+ RQAAHAFfAAAOERxifwAAAQgICAhJmB+QAAgHpQ==
+ summary: IP / UDP 127.0.0.1:18840 > 8.8.8.8:http_alt
+test_icmp_traceroute:
+ hops:
+ - {address: 10.0.1.1, rtt: 3.9715609550476074, ttl: 1}
+ - {address: 10.72.240.1, rtt: 4.018263101577759, ttl: 2}
+ - {address: 10.1.231.154, rtt: 4.0202929973602295, ttl: 3}
+ - {address: 10.251.161.201, rtt: 4.024235963821411, ttl: 4}
+ - {address: 10.251.156.26, rtt: 4.028274059295654, ttl: 5}
+ - {address: 10.251.157.1, rtt: 4.032228946685791, ttl: 6}
+ - {address: 10.247.125.85, rtt: 4.035927057266235, ttl: 7}
+ - {address: 10.251.161.194, rtt: 4.039880037307739, ttl: 8}
+ - {address: 10.103.124.5, rtt: 4.043823003768921, ttl: 9}
+ - {address: 10.1.128.61, rtt: 4.04759407043457, ttl: 10}
+ - {address: 10.254.11.77, rtt: 4.052925109863281, ttl: 11}
+ - {address: 89.97.200.106, rtt: 4.056672096252441, ttl: 12}
+ - {address: 89.97.200.254, rtt: 4.067225933074951, ttl: 13}
+ - {address: 89.96.200.126, rtt: 4.069293975830078, ttl: 14}
+ - {address: 72.14.211.55, rtt: 4.071274995803833, ttl: 15}
+ - {address: 209.85.241.92, rtt: 4.073256015777588, ttl: 16}
+ - {address: 72.14.232.78, rtt: 4.075243949890137, ttl: 17}
+ - {address: 209.85.254.116, rtt: 4.077281951904297, ttl: 18}
+ - {address: 8.8.8.8, rtt: 4.079555988311768, ttl: 19}
+ - {address: 8.8.8.8, rtt: 4.5740931034088135, ttl: 20}
+test_tcp_traceroute:
+ hops_0:
+ - {address: 10.0.1.1, rtt: 0.8929989337921143, sport: 33550, ttl: 1}
+ - {address: 10.1.231.154, rtt: 0.9173901081085205, sport: 33550, ttl: 2}
+ - {address: 10.251.161.201, rtt: 0.9208340644836426, sport: 33550, ttl: 3}
+ - {address: 10.251.156.26, rtt: 0.9243190288543701, sport: 33550, ttl: 4}
+ - {address: 10.251.157.1, rtt: 0.9279429912567139, sport: 33550, ttl: 5}
+ hops_123:
+ - {address: 10.0.1.1, rtt: 1.057663917541504, sport: 10729, ttl: 1}
+ - {address: 10.72.240.1, rtt: 1.0832798480987549, sport: 10729, ttl: 2}
+ - {address: 10.1.231.154, rtt: 1.0852348804473877, sport: 10729, ttl: 3}
+ - {address: 10.251.161.201, rtt: 1.0872218608856201, sport: 10729, ttl: 4}
+ - {address: 10.251.156.26, rtt: 1.0913589000701904, sport: 10729, ttl: 5}
+ - {address: 10.251.157.1, rtt: 1.0950088500976562, sport: 10729, ttl: 6}
+ - {address: 10.247.125.85, rtt: 1.0984508991241455, sport: 10729, ttl: 7}
+ - {address: 10.251.161.194, rtt: 1.106515884399414, sport: 10729, ttl: 8}
+ - {address: 10.103.124.5, rtt: 1.1134669780731201, sport: 10729, ttl: 9}
+ - {address: 10.1.128.61, rtt: 1.1153309345245361, sport: 10729, ttl: 10}
+ - {address: 10.254.11.77, rtt: 1.1171259880065918, sport: 10729, ttl: 11}
+ - {address: 89.97.200.106, rtt: 1.118973970413208, sport: 10729, ttl: 12}
+ - {address: 62.101.124.65, rtt: 1.1317999362945557, sport: 10729, ttl: 13}
+ - {address: 89.97.200.254, rtt: 1.1352579593658447, sport: 10729, ttl: 14}
+ hops_22:
+ - {address: 10.0.1.1, rtt: 0.887671947479248, sport: 31561, ttl: 1}
+ - {address: 10.72.240.1, rtt: 0.9095978736877441, sport: 31561, ttl: 2}
+ - {address: 10.1.231.154, rtt: 0.9134628772735596, sport: 31561, ttl: 3}
+ - {address: 10.251.161.201, rtt: 0.9172408580780029, sport: 31561, ttl: 4}
+ - {address: 10.251.156.26, rtt: 0.9208929538726807, sport: 31561, ttl: 5}
+ - {address: 10.251.157.1, rtt: 0.9243419170379639, sport: 31561, ttl: 6}
+ - {address: 10.247.125.85, rtt: 0.9276900291442871, sport: 31561, ttl: 7}
+ - {address: 10.251.161.194, rtt: 0.9310119152069092, sport: 31561, ttl: 8}
+ - {address: 10.103.124.5, rtt: 0.937445878982544, sport: 31561, ttl: 9}
+ - {address: 10.1.128.61, rtt: 0.939384937286377, sport: 31561, ttl: 10}
+ - {address: 10.254.11.77, rtt: 0.9427988529205322, sport: 31561, ttl: 11}
+ - {address: 89.97.200.106, rtt: 0.9527590274810791, sport: 31561, ttl: 12}
+ - {address: 89.97.200.254, rtt: 0.95943284034729, sport: 31561, ttl: 13}
+ - {address: 89.96.200.134, rtt: 0.9697248935699463, sport: 31561, ttl: 14}
+ hops_23:
+ - {address: 10.0.1.1, rtt: 0.9211528301239014, sport: 5097, ttl: 1}
+ - {address: 10.72.240.1, rtt: 0.9416170120239258, sport: 5097, ttl: 2}
+ - {address: 10.1.231.154, rtt: 0.9434559345245361, sport: 5097, ttl: 3}
+ - {address: 10.251.161.201, rtt: 0.9484758377075195, sport: 5097, ttl: 4}
+ - {address: 10.251.156.26, rtt: 0.9505150318145752, sport: 5097, ttl: 5}
+ - {address: 10.251.157.1, rtt: 0.9561848640441895, sport: 5097, ttl: 6}
+ - {address: 10.247.125.85, rtt: 0.960468053817749, sport: 5097, ttl: 7}
+ - {address: 10.251.161.194, rtt: 0.9639179706573486, sport: 5097, ttl: 8}
+ - {address: 10.103.124.5, rtt: 0.9702839851379395, sport: 5097, ttl: 9}
+ - {address: 10.1.128.61, rtt: 0.9737949371337891, sport: 5097, ttl: 10}
+ - {address: 10.254.11.77, rtt: 0.9802989959716797, sport: 5097, ttl: 11}
+ - {address: 89.97.200.106, rtt: 0.9836268424987793, sport: 5097, ttl: 12}
+ - {address: 89.97.200.254, rtt: 0.99639892578125, sport: 5097, ttl: 13}
+ - {address: 89.96.200.126, rtt: 1.0050489902496338, sport: 5097, ttl: 14}
+ hops_443:
+ - {address: 10.0.1.1, rtt: 1.0840370655059814, sport: 63889, ttl: 1}
+ - {address: 10.1.231.154, rtt: 1.109666109085083, sport: 63889, ttl: 2}
+ - {address: 10.251.161.201, rtt: 1.113111972808838, sport: 63889, ttl: 3}
+ - {address: 10.251.156.26, rtt: 1.1165308952331543, sport: 63889, ttl: 4}
+ - {address: 10.251.157.1, rtt: 1.1198999881744385, sport: 63889, ttl: 5}
+ - {address: 10.247.125.85, rtt: 1.1232690811157227, sport: 63889, ttl: 6}
+ - {address: 10.251.161.194, rtt: 1.1285760402679443, sport: 63889, ttl: 7}
+ - {address: 10.103.124.5, rtt: 1.1326820850372314, sport: 63889, ttl: 8}
+ - {address: 10.1.128.61, rtt: 1.139185905456543, sport: 63889, ttl: 9}
+ - {address: 10.254.11.77, rtt: 1.1459689140319824, sport: 63889, ttl: 10}
+ - {address: 89.97.200.106, rtt: 1.1481139659881592, sport: 63889, ttl: 11}
+ - {address: 89.97.200.254, rtt: 1.1560420989990234, sport: 63889, ttl: 12}
+ - {address: 89.96.200.134, rtt: 1.1640660762786865, sport: 63889, ttl: 13}
+ hops_53:
+ - {address: 10.0.1.1, rtt: 0.9541549682617188, sport: 6421, ttl: 1}
+ - {address: 10.72.240.1, rtt: 0.9729020595550537, sport: 6421, ttl: 2}
+ - {address: 10.1.231.154, rtt: 0.9748890399932861, sport: 6421, ttl: 3}
+ - {address: 10.251.161.201, rtt: 0.9788179397583008, sport: 6421, ttl: 4}
+ - {address: 10.251.156.26, rtt: 0.9826369285583496, sport: 6421, ttl: 5}
+ - {address: 10.251.157.1, rtt: 0.9876649379730225, sport: 6421, ttl: 6}
+ - {address: 10.247.125.85, rtt: 0.9913709163665771, sport: 6421, ttl: 7}
+ - {address: 10.251.161.194, rtt: 0.997809886932373, sport: 6421, ttl: 8}
+ - {address: 10.103.124.5, rtt: 0.9996218681335449, sport: 6421, ttl: 9}
+ - {address: 10.1.128.61, rtt: 1.0029208660125732, sport: 6421, ttl: 10}
+ - {address: 10.254.11.77, rtt: 1.0111238956451416, sport: 6421, ttl: 11}
+ - {address: 89.97.200.106, rtt: 1.0159449577331543, sport: 6421, ttl: 12}
+ - {address: 89.97.200.254, rtt: 1.0279550552368164, sport: 6421, ttl: 13}
+ - {address: 89.96.200.46, rtt: 1.0326428413391113, sport: 6421, ttl: 14}
+ - {address: 72.14.211.89, rtt: 1.039456844329834, sport: 6421, ttl: 15}
+ - {address: 209.85.241.92, rtt: 1.0447049140930176, sport: 6421, ttl: 16}
+ - {address: 72.14.232.78, rtt: 1.0516810417175293, sport: 6421, ttl: 17}
+ - {address: 209.85.254.114, rtt: 1.058819055557251, sport: 6421, ttl: 18}
+ - {address: 8.8.8.8, rtt: 1.064857006072998, sport: 6421, ttl: 19}
+ - {address: 8.8.8.8, rtt: 1.074767827987671, sport: 6421, ttl: 20}
+ - {address: 8.8.8.8, rtt: 1.0773730278015137, sport: 6421, ttl: 21}
+ - {address: 8.8.8.8, rtt: 1.0835769176483154, sport: 6421, ttl: 22}
+ - {address: 8.8.8.8, rtt: 1.0862410068511963, sport: 6421, ttl: 23}
+ - {address: 8.8.8.8, rtt: 1.0980219841003418, sport: 6421, ttl: 24}
+ - {address: 8.8.8.8, rtt: 1.1042819023132324, sport: 6421, ttl: 25}
+ - {address: 8.8.8.8, rtt: 1.1147940158843994, sport: 6421, ttl: 26}
+ - {address: 8.8.8.8, rtt: 1.1190860271453857, sport: 6421, ttl: 27}
+ - {address: 8.8.8.8, rtt: 1.1216108798980713, sport: 6421, ttl: 28}
+ - {address: 8.8.8.8, rtt: 1.127511978149414, sport: 6421, ttl: 29}
+ hops_65535:
+ - {address: 10.0.1.1, rtt: 1.1430189609527588, sport: 37293, ttl: 1}
+ - {address: 10.72.240.1, rtt: 1.168022871017456, sport: 37293, ttl: 2}
+ - {address: 10.1.231.154, rtt: 1.1717679500579834, sport: 37293, ttl: 3}
+ - {address: 10.251.161.201, rtt: 1.1754209995269775, sport: 37293, ttl: 4}
+ - {address: 10.251.156.26, rtt: 1.177292823791504, sport: 37293, ttl: 5}
+ - {address: 10.251.157.1, rtt: 1.1840429306030273, sport: 37293, ttl: 6}
+ - {address: 10.247.125.85, rtt: 1.185985803604126, sport: 37293, ttl: 7}
+ - {address: 10.251.161.194, rtt: 1.1920018196105957, sport: 37293, ttl: 8}
+ - {address: 10.103.124.5, rtt: 1.1955947875976562, sport: 37293, ttl: 9}
+ - {address: 10.1.128.61, rtt: 1.1989409923553467, sport: 37293, ttl: 10}
+ - {address: 10.254.11.77, rtt: 1.2022309303283691, sport: 37293, ttl: 11}
+ - {address: 89.97.200.106, rtt: 1.2070260047912598, sport: 37293, ttl: 12}
+ - {address: 89.97.200.254, rtt: 1.236454963684082, sport: 37293, ttl: 13}
+ - {address: 89.96.200.134, rtt: 1.2652239799499512, sport: 37293, ttl: 14}
+ hops_80:
+ - {address: 10.0.1.1, rtt: 0.9794230461120605, sport: 48728, ttl: 1}
+ - {address: 10.1.231.154, rtt: 1.0122148990631104, sport: 48728, ttl: 2}
+ - {address: 10.72.240.1, rtt: 1.0160748958587646, sport: 48728, ttl: 3}
+ - {address: 10.251.161.201, rtt: 1.022981882095337, sport: 48728, ttl: 4}
+ - {address: 10.251.156.26, rtt: 1.0264310836791992, sport: 48728, ttl: 5}
+ - {address: 10.251.157.1, rtt: 1.036902904510498, sport: 48728, ttl: 6}
+ - {address: 10.247.125.85, rtt: 1.0441060066223145, sport: 48728, ttl: 7}
+ - {address: 10.251.161.194, rtt: 1.0476000308990479, sport: 48728, ttl: 8}
+ - {address: 10.103.124.5, rtt: 1.056222915649414, sport: 48728, ttl: 9}
+ - {address: 10.1.128.61, rtt: 1.0620770454406738, sport: 48728, ttl: 10}
+ - {address: 10.254.11.77, rtt: 1.0713310241699219, sport: 48728, ttl: 11}
+ - {address: 89.97.200.106, rtt: 1.0809619426727295, sport: 48728, ttl: 12}
+ - {address: 89.97.200.254, rtt: 1.0914230346679688, sport: 48728, ttl: 13}
+ - {address: 89.96.200.126, rtt: 1.0984768867492676, sport: 48728, ttl: 14}
+ hops_8080:
+ - {address: 10.0.1.1, rtt: 1.1146080493927002, sport: 57884, ttl: 1}
+ - {address: 10.1.231.154, rtt: 1.1394469738006592, sport: 57884, ttl: 2}
+ - {address: 10.251.161.201, rtt: 1.1429920196533203, sport: 57884, ttl: 3}
+ - {address: 10.251.156.26, rtt: 1.1465580463409424, sport: 57884, ttl: 4}
+ - {address: 10.251.157.1, rtt: 1.150658130645752, sport: 57884, ttl: 5}
+ - {address: 10.247.125.85, rtt: 1.1548030376434326, sport: 57884, ttl: 6}
+ - {address: 10.251.161.194, rtt: 1.1582081317901611, sport: 57884, ttl: 7}
+ - {address: 10.103.124.5, rtt: 1.1615681648254395, sport: 57884, ttl: 8}
+ - {address: 10.1.128.61, rtt: 1.1648681163787842, sport: 57884, ttl: 9}
+ - {address: 10.254.11.77, rtt: 1.1742961406707764, sport: 57884, ttl: 10}
+ - {address: 89.97.200.106, rtt: 1.177865982055664, sport: 57884, ttl: 11}
+ - {address: 89.97.200.254, rtt: 1.1897270679473877, sport: 57884, ttl: 12}
+ - {address: 62.101.124.65, rtt: 1.1932711601257324, sport: 57884, ttl: 13}
+test_udp_traceroute:
+ hops_0: []
+ hops_123:
+ - {address: 10.0.1.1, rtt: 2.8643651008605957, sport: 29598, ttl: 1}
+ - {address: 10.72.240.1, rtt: 2.9663000106811523, sport: 29598, ttl: 2}
+ - {address: 10.1.231.154, rtt: 2.985211133956909, sport: 29598, ttl: 3}
+ - {address: 10.251.161.201, rtt: 3.0045831203460693, sport: 29598, ttl: 4}
+ - {address: 10.251.156.26, rtt: 3.018602132797241, sport: 29598, ttl: 5}
+ - {address: 10.251.157.1, rtt: 3.0379550457000732, sport: 29598, ttl: 6}
+ - {address: 10.247.125.85, rtt: 3.0577399730682373, sport: 29598, ttl: 7}
+ - {address: 10.251.161.194, rtt: 3.071830987930298, sport: 29598, ttl: 8}
+ - {address: 10.103.124.5, rtt: 3.096630096435547, sport: 29598, ttl: 9}
+ - {address: 10.1.128.61, rtt: 3.110487937927246, sport: 29598, ttl: 10}
+ - {address: 10.254.11.77, rtt: 3.159827947616577, sport: 29598, ttl: 11}
+ - {address: 89.97.200.106, rtt: 3.1841320991516113, sport: 29598, ttl: 12}
+ - {address: 89.97.200.254, rtt: 3.221647024154663, sport: 29598, ttl: 13}
+ - {address: 89.96.200.126, rtt: 3.2409000396728516, sport: 29598, ttl: 14}
+ hops_22:
+ - {address: 10.0.1.1, rtt: 1.3334949016571045, sport: 15233, ttl: 1}
+ - {address: 10.1.231.154, rtt: 1.4409840106964111, sport: 15233, ttl: 2}
+ - {address: 10.72.240.1, rtt: 1.4585249423980713, sport: 15233, ttl: 3}
+ - {address: 10.251.161.201, rtt: 1.482278823852539, sport: 15233, ttl: 4}
+ - {address: 10.251.156.26, rtt: 1.5005879402160645, sport: 15233, ttl: 5}
+ - {address: 10.251.157.1, rtt: 1.531883955001831, sport: 15233, ttl: 6}
+ - {address: 10.247.125.85, rtt: 1.5560660362243652, sport: 15233, ttl: 7}
+ - {address: 10.251.161.194, rtt: 1.5865838527679443, sport: 15233, ttl: 8}
+ - {address: 10.103.124.5, rtt: 1.6111359596252441, sport: 15233, ttl: 9}
+ - {address: 10.1.128.61, rtt: 1.6353850364685059, sport: 15233, ttl: 10}
+ - {address: 10.254.11.77, rtt: 1.6537768840789795, sport: 15233, ttl: 11}
+ - {address: 89.97.200.106, rtt: 1.6786339282989502, sport: 15233, ttl: 12}
+ - {address: 89.97.200.254, rtt: 1.7631969451904297, sport: 15233, ttl: 13}
+ - {address: 89.96.200.126, rtt: 1.7871499061584473, sport: 15233, ttl: 14}
+ hops_23:
+ - {address: 10.0.1.1, rtt: 1.6981499195098877, sport: 43782, ttl: 1}
+ - {address: 10.72.240.1, rtt: 1.8316938877105713, sport: 43782, ttl: 2}
+ - {address: 10.1.231.154, rtt: 1.8493030071258545, sport: 43782, ttl: 3}
+ - {address: 10.251.161.201, rtt: 1.878938913345337, sport: 43782, ttl: 4}
+ - {address: 10.251.156.26, rtt: 1.9026379585266113, sport: 43782, ttl: 5}
+ - {address: 10.251.157.1, rtt: 1.9251139163970947, sport: 43782, ttl: 6}
+ - {address: 10.247.125.85, rtt: 1.9485108852386475, sport: 43782, ttl: 7}
+ - {address: 10.251.161.194, rtt: 1.9832098484039307, sport: 43782, ttl: 8}
+ - {address: 10.103.124.5, rtt: 2.0001959800720215, sport: 43782, ttl: 9}
+ - {address: 10.1.128.61, rtt: 2.0243330001831055, sport: 43782, ttl: 10}
+ - {address: 10.254.11.77, rtt: 2.047346830368042, sport: 43782, ttl: 11}
+ - {address: 89.97.200.106, rtt: 2.070168972015381, sport: 43782, ttl: 12}
+ - {address: 89.97.200.254, rtt: 2.1522560119628906, sport: 43782, ttl: 13}
+ - {address: 62.101.124.65, rtt: 2.9604408740997314, sport: 43782, ttl: 14}
+ hops_443:
+ - {address: 10.0.1.1, rtt: 3.1613810062408447, sport: 15782, ttl: 1}
+ - {address: 10.72.240.1, rtt: 3.2684850692749023, sport: 15782, ttl: 2}
+ - {address: 10.1.231.154, rtt: 3.2818000316619873, sport: 15782, ttl: 3}
+ - {address: 10.251.161.201, rtt: 3.300002098083496, sport: 15782, ttl: 4}
+ - {address: 10.251.156.26, rtt: 3.323151111602783, sport: 15782, ttl: 5}
+ - {address: 10.251.157.1, rtt: 3.3413009643554688, sport: 15782, ttl: 6}
+ - {address: 10.247.125.85, rtt: 3.359462022781372, sport: 15782, ttl: 7}
+ - {address: 10.251.161.194, rtt: 3.377542018890381, sport: 15782, ttl: 8}
+ - {address: 10.103.124.5, rtt: 3.396583080291748, sport: 15782, ttl: 9}
+ - {address: 10.1.128.61, rtt: 3.4149301052093506, sport: 15782, ttl: 10}
+ - {address: 10.254.11.77, rtt: 3.4378039836883545, sport: 15782, ttl: 11}
+ - {address: 89.97.200.106, rtt: 3.4557440280914307, sport: 15782, ttl: 12}
+ - {address: 89.97.200.254, rtt: 3.5199360847473145, sport: 15782, ttl: 13}
+ - {address: 62.101.124.65, rtt: 3.5376710891723633, sport: 15782, ttl: 14}
+ hops_53:
+ - {address: 10.0.1.1, rtt: 2.0826339721679688, sport: 9222, ttl: 1}
+ - {address: 10.1.231.154, rtt: 2.1999151706695557, sport: 9222, ttl: 2}
+ - {address: 10.251.161.201, rtt: 2.2224841117858887, sport: 9222, ttl: 3}
+ - {address: 10.251.156.26, rtt: 2.2450520992279053, sport: 9222, ttl: 4}
+ - {address: 10.251.157.1, rtt: 2.267009973526001, sport: 9222, ttl: 5}
+ - {address: 10.247.125.85, rtt: 2.2895491123199463, sport: 9222, ttl: 6}
+ - {address: 10.72.240.1, rtt: 2.4096531867980957, sport: 9222, ttl: 7}
+ - {address: 10.251.161.194, rtt: 2.425421953201294, sport: 9222, ttl: 8}
+ - {address: 10.103.124.5, rtt: 2.441133975982666, sport: 9222, ttl: 9}
+ - {address: 10.1.128.61, rtt: 2.457381010055542, sport: 9222, ttl: 10}
+ - {address: 10.254.11.77, rtt: 2.4967970848083496, sport: 9222, ttl: 11}
+ - {address: 89.97.200.106, rtt: 2.5189261436462402, sport: 9222, ttl: 12}
+ - {address: 89.97.200.254, rtt: 2.550632953643799, sport: 9222, ttl: 13}
+ - {address: 72.14.211.89, rtt: 2.5663211345672607, sport: 9222, ttl: 14}
+ - {address: 209.85.241.94, rtt: 2.582092046737671, sport: 9222, ttl: 15}
+ - {address: 89.96.200.126, rtt: 2.5982320308685303, sport: 9222, ttl: 16}
+ - {address: 72.14.232.76, rtt: 2.661022186279297, sport: 9222, ttl: 17}
+ - {address: 209.85.254.112, rtt: 2.7243690490722656, sport: 9222, ttl: 18}
+ hops_65535:
+ - {address: 10.0.1.1, rtt: 3.7303781509399414, sport: 10991, ttl: 1}
+ - {address: 10.72.240.1, rtt: 3.7946829795837402, sport: 10991, ttl: 2}
+ - {address: 10.1.231.154, rtt: 3.8064370155334473, sport: 10991, ttl: 3}
+ - {address: 10.251.161.201, rtt: 3.8219411373138428, sport: 10991, ttl: 4}
+ - {address: 10.251.156.26, rtt: 3.8330190181732178, sport: 10991, ttl: 5}
+ - {address: 10.251.157.1, rtt: 3.8488430976867676, sport: 10991, ttl: 6}
+ - {address: 10.247.125.85, rtt: 3.864877939224243, sport: 10991, ttl: 7}
+ - {address: 10.251.161.194, rtt: 3.9216160774230957, sport: 10991, ttl: 8}
+ - {address: 10.103.124.5, rtt: 3.9326281547546387, sport: 10991, ttl: 9}
+ - {address: 10.1.128.61, rtt: 3.9524900913238525, sport: 10991, ttl: 10}
+ - {address: 10.254.11.77, rtt: 3.9684531688690186, sport: 10991, ttl: 11}
+ - {address: 89.97.200.106, rtt: 3.9926950931549072, sport: 10991, ttl: 12}
+ - {address: 89.97.200.254, rtt: 4.027745008468628, sport: 10991, ttl: 13}
+ - {address: 89.96.200.46, rtt: 4.04297399520874, sport: 10991, ttl: 14}
+ hops_80:
+ - {address: 10.0.1.1, rtt: 2.4942288398742676, sport: 23951, ttl: 1}
+ - {address: 10.1.231.154, rtt: 2.584718942642212, sport: 23951, ttl: 2}
+ - {address: 10.72.240.1, rtt: 2.5997419357299805, sport: 23951, ttl: 3}
+ - {address: 10.251.161.201, rtt: 2.6360549926757812, sport: 23951, ttl: 4}
+ - {address: 10.251.156.26, rtt: 2.6616249084472656, sport: 23951, ttl: 5}
+ - {address: 10.251.157.1, rtt: 2.6992008686065674, sport: 23951, ttl: 6}
+ - {address: 10.247.125.85, rtt: 2.7195730209350586, sport: 23951, ttl: 7}
+ - {address: 10.251.161.194, rtt: 2.745745897293091, sport: 23951, ttl: 8}
+ - {address: 10.103.124.5, rtt: 2.7869420051574707, sport: 23951, ttl: 9}
+ - {address: 10.1.128.61, rtt: 2.8128459453582764, sport: 23951, ttl: 10}
+ - {address: 10.254.11.77, rtt: 2.838701009750366, sport: 23951, ttl: 11}
+ - {address: 89.97.200.106, rtt: 2.853529930114746, sport: 23951, ttl: 12}
+ - {address: 89.97.200.254, rtt: 2.945657968521118, sport: 23951, ttl: 13}
+ - {address: 89.96.200.46, rtt: 2.9657039642333984, sport: 23951, ttl: 14}
+ hops_8080:
+ - {address: 10.0.1.1, rtt: 3.457942008972168, sport: 18840, ttl: 1}
+ - {address: 10.72.240.1, rtt: 3.5681920051574707, sport: 18840, ttl: 2}
+ - {address: 10.1.231.154, rtt: 3.5803709030151367, sport: 18840, ttl: 3}
+ - {address: 10.251.161.201, rtt: 3.5968568325042725, sport: 18840, ttl: 4}
+ - {address: 10.251.156.26, rtt: 3.6134979724884033, sport: 18840, ttl: 5}
+ - {address: 10.251.157.1, rtt: 3.62577486038208, sport: 18840, ttl: 6}
+ - {address: 10.247.125.85, rtt: 3.6425728797912598, sport: 18840, ttl: 7}
+ - {address: 10.251.161.194, rtt: 3.659623861312866, sport: 18840, ttl: 8}
+ - {address: 10.103.124.5, rtt: 3.6761529445648193, sport: 18840, ttl: 9}
+ - {address: 10.1.128.61, rtt: 3.6931769847869873, sport: 18840, ttl: 10}
+ - {address: 10.254.11.77, rtt: 3.7094268798828125, sport: 18840, ttl: 11}
+ - {address: 89.97.200.106, rtt: 3.731276035308838, sport: 18840, ttl: 12}
+ - {address: 89.97.200.254, rtt: 3.7874269485473633, sport: 18840, ttl: 13}
+ - {address: 89.96.200.134, rtt: 3.823248863220215, sport: 18840, ttl: 14}
+timeout: 5
+...
+```
+
+# Privacy considerations
+
+The scapyt report format includes the binary packets as sent or received. In the ICMP response payload a portion (64 bits) or all of the original packet is returned. The client source address will be contained in the report.
1
0

[spec/master] Add errors that were added in https://github.com/TheTorProject/ooni-probe/pull/456
by art@torproject.org 09 May '16
by art@torproject.org 09 May '16
09 May '16
commit d0e35efb2071318122c744468ff059acdddcd7e3
Author: Arturo Filastò <arturo(a)filasto.net>
Date: Thu Mar 10 18:31:50 2016 +0100
Add errors that were added in https://github.com/TheTorProject/ooni-probe/pull/456
---
data-formats/df-000-base.md | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/data-formats/df-000-base.md b/data-formats/df-000-base.md
index c1431e3..aab0f1c 100644
--- a/data-formats/df-000-base.md
+++ b/data-formats/df-000-base.md
@@ -146,6 +146,10 @@ error_string:
* twisted.internet.defer.TimeoutError: `deferred_timeout_error`
+* twisted.names.error.DNSNameError: `dns_name_error`
+
+* twisted.names.error.DNSServerError: `dns_name_failure`
+
* txsocksx.errors.ServerFailure: `socks_server_failure`
* txsocksx.errors.ConnectionNotAllowed: `socks_connection_not_allowed`
1
0