2
我正在使用RJ45連接本地網絡的嵌入式設備,以及系統發送ARP請求以瞭解網關的MAC地址時,根本沒有答案。爲什麼我沒有收到來自ARP請求的答覆?
如果我清除Windows上的arp表,Windows會詢問完全相同的ARP請求並獲得答案!
我嗅探了數據包,請求數據包內唯一的區別是數據包末尾的嵌入式設備上有一個0尾部,目標MAC地址是ff:ff:ff:ff:ff:ff其中窗口一個是00:00:00:00:00:00(維基百科似乎說它應該是ffffffffff)
我試圖更改mac地址,以防我的網關因arp垃圾郵件而禁止mac,但它不會什麼都不會改變。我也試着用DHCP IP和靜態IP,同樣的問題...
的Windows包:
Frame 1 (42 bytes on wire, 42 bytes captured) Frame is marked: False Arrival Time: Jan 29, 2010 12:05:49.775534000 Time delta from previous packet: -77.580549000 seconds Time since reference or first frame: 6354.738379000 seconds Frame Number: 1 Packet Length: 42 bytes Capture Length: 42 bytes Protocols in frame: eth:arp Ethernet II, Src: 00:1e:8c:b5:d0:00, Dst: ff:ff:ff:ff:ff:ff Type: ARP (0x0806) Address Resolution Protocol (request) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: 00:1e:8c:b5:d0:00 (00:1e:8c:b5:d0:00) Sender IP address: 192.168.0.14 (192.168.0.14) Target MAC address: 00:00:00:00:00:00 (00:00:00:00:00:00) Target IP address: 192.168.0.1 (192.168.0.1) 0000: FF FF FF FF FF FF 00 1E 8C B5 D0 00 08 06 00 01 ................ 0010: 08 00 06 04 00 01 00 1E 8C B5 D0 00 C0 A8 00 0E ................ 0020: 00 00 00 00 00 00 C0 A8 00 01 ..........
嵌入式設備的分組:
Frame 1 (60 bytes on wire, 60 bytes captured) Frame is marked: False Arrival Time: Jan 29, 2010 12:07:04.257748000 Time delta from previous packet: -3.098335000 seconds Time since reference or first frame: 6429.220593000 seconds Frame Number: 1 Packet Length: 60 bytes Capture Length: 60 bytes Protocols in frame: eth:arp Ethernet II, Src: 00:04:a3:12:34:05, Dst: ff:ff:ff:ff:ff:ff Type: ARP (0x0806) Trailer: 000000000000000000000000000000000000 Address Resolution Protocol (request) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: 00:04:a3:12:34:05 (00:04:a3:12:34:05) Sender IP address: 192.168.0.129 (192.168.0.129) Target MAC address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Target IP address: 192.168.0.1 (192.168.0.1) 0000: FF FF FF FF FF FF 00 04 A3 12 34 05 08 06 00 01 ..........4..... 0010: 08 00 06 04 00 01 00 04 A3 12 34 05 C0 A8 00 81 ..........4..... 0020: FF FF FF FF FF FF C0 A8 00 01 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 ............
你確定你的網絡不使用vlan或類似的東西(隧道?)?您的Windows數據包小於64字節,這是包含crc的以太網幀的最小長度。一些nics /驅動程序會剝離掉這樣的圖層,並且您不會在wireshark中看到它。 – nos 2010-01-29 12:07:09
沒有vlan。這只是一個互聯網盒(freebox)與我的電腦,並在箱子上rj45(作爲路由器)作爲嵌入盒 由於我在同一臺PC上嗅探,也許wireshark(packetyzer事實上)刪除預告片。 – acemtp 2010-01-29 12:58:54
我也有一些非常奇怪的行爲,如: - 當我的電腦ping圖片時,它工作2次,超時後(LED仍然每秒閃爍) - 當它試圖通過DHCP獲取IP時,它詢問N次(其中N是隨機的),從網關獲得答案,發送請求,接收ACK但不驗證DHCP並要求另一時間... 您有想法嗎? – acemtp 2010-01-29 16:58:59