Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Destination unreachable #81

Open
rty813 opened this issue May 21, 2024 · 3 comments
Open

Destination unreachable #81

rty813 opened this issue May 21, 2024 · 3 comments

Comments

@rty813
Copy link

rty813 commented May 21, 2024

Unable to ping baidu.com with the ping3 command; the response is "destination unreachable," but the ping command is correct.

root@i3:/home/orca/ws# ping3 --version
4.0.8
root@i3:/home/orca/ws# ping baidu.com
PING baidu.com (110.242.68.66) 56(84) bytes of data.
64 bytes from 110.242.68.66 (110.242.68.66): icmp_seq=1 ttl=48 time=128 ms
64 bytes from 110.242.68.66 (110.242.68.66): icmp_seq=2 ttl=48 time=123 ms
64 bytes from 110.242.68.66 (110.242.68.66): icmp_seq=3 ttl=48 time=128 ms
64 bytes from 110.242.68.66 (110.242.68.66): icmp_seq=4 ttl=48 time=134 ms
^C
--- baidu.com ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3003ms
rtt min/avg/max/mdev = 122.719/128.000/133.616/3.857 ms
root@i3:/home/orca/ws# ping3 -D -c1 baidu.com
[DEBUG] Ping3 Version: 4.0.8
[DEBUG] LOGGER: <Logger ping3 (DEBUG)>
[DEBUG] Function called: verbose_ping(baidu.com, {'count': 1, 'ttl': 64, 'timeout': 4, 'size': 56, 'interval': 0, 'interface': '', 'src_addr': ''})
[DEBUG] Function called: ping(baidu.com, {'seq': 0, 'ttl': 64, 'timeout': 4, 'size': 56, 'interface': '', 'src_addr': '', 'unit': 'ms'})
[DEBUG] Function called: send_one_ping({'sock': <socket.socket fd=3, family=AddressFamily.AF_INET, type=SocketKind.SOCK_RAW, proto=1, laddr=('0.0.0.0', 1)>, 'dest_addr': 'baidu.com', 'icmp_id': 54198, 'seq': 0, 'size': 56})
[DEBUG] Destination address: 'baidu.com'
[DEBUG] Destination IP address: 39.156.66.10
[DEBUG] Sent ICMP header: {'type': 8, 'code': 0, 'checksum': 50954, 'id': 54198, 'seq': 0}
[DEBUG] Sent ICMP payload: b'A\xd9\x93\x1a\xce\xac\x19\xfeQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ'
[DEBUG] Function returned: send_one_ping -> None
[DEBUG] Function called: receive_one_ping({'sock': <socket.socket fd=3, family=AddressFamily.AF_INET, type=SocketKind.SOCK_RAW, proto=1, laddr=('0.0.0.0', 1)>, 'icmp_id': 54198, 'seq': 0, 'timeout': 4})
[DEBUG] Timeout time: Tue May 21 17:37:02 2024 (1716284222.6896996)
[DEBUG] Timeout left: 4.00s
[DEBUG] Received time: Tue May 21 17:36:58 2024 (1716284218.6898766))
[DEBUG] Received IP header: {'version': 69, 'tos': 192, 'len': 368, 'id': 48656, 'flags': 0, 'ttl': 64, 'protocol': 1, 'checksum': 48314, 'src_addr': '127.0.0.1', 'dest_addr': '127.0.0.1'}
[DEBUG] Received ICMP header: {'type': 3, 'code': 3, 'checksum': 51918, 'id': 0, 'seq': 0}
[DEBUG] Received ICMP payload: b'E\x00\x01T\x94P@\x00@\x11\xa7F\x7f\x00\x00\x01\x7f\x00\x00\x01\x80\xb0\x1d\x08\x01@\xffSRTPS\x02\x03\x01\x0f\x01\x0f\xaa\xa1\xd7\nN)\x02\x00\x00\x00\t\x01\x08\x00\x91ULf\x85\xa6R\xd2\x15\x07\x14\x01\x00\x00\x10\x00\x00\x01\x00\xc7\x00\x01\x00\xc2\x00\x00\x00\x00\x01\x00\x00\x00\x0f\x80\x18\x00\x01\x0f\xaa\xa1\xd7\nN)\x01\x00\x00\x00\x00\x01\x00\xc2\x00\x00\x00\x00\x02\x00\x00\x00\x01\x00\x00\x00\x00\x03\x00\x00\x15\x00\x04\x00\x02\x03\x00\x00\x16\x00\x04\x00\x01\x0f\x00\x00P\x00\x10\x00\x01\x0f\xaa\xa1\xd7\nN)\x02\x00\x00\x00\x00\x00\x01\xc12\x00\x18\x00\x01\x00\x00\x00\xf6\x1c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\xa8\x03\x0b1\x00\x18\x00\x10\x00\x00\x00\xf7\x1c\x00\x00U\xaa\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x001\x00\x18\x00\x01\x00\x00\x00\xf7\x1c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\xa8\x03\x0b\x02\x00\x08\x00\x14\x00\x00\x00\x00\x00\x00\x00X\x00\x04\x00?\x0c\x0f\x00b\x00\x08\x00\x02\x00\x00\x00/\x00\x00\x00,\x00\x10\x00\x0b\x00\x00\x00enclave=/;\x00\x00Y\x00(\x00\x01\x00\x00\x00\x11\x00\x00\x00PARTICIPANT_TYPE\x00\x00\x00\x00\x07\x00\x00\x00SIMPLE\x00\x00\x01\x00\x00\x00'
[DEBUG] Destination unreachable. (Host='127.0.0.1')
[DEBUG] Function returned: ping -> False
ping 'baidu.com' ... Error
[DEBUG] Function returned: verbose_ping -> None
root@i3:/home/orca/ws# ping3 -D -I usb0 -c1 baidu.com
[DEBUG] Ping3 Version: 4.0.8
[DEBUG] LOGGER: <Logger ping3 (DEBUG)>
[DEBUG] Function called: verbose_ping(baidu.com, {'count': 1, 'ttl': 64, 'timeout': 4, 'size': 56, 'interval': 0, 'interface': 'usb0', 'src_addr': ''})
[DEBUG] Function called: ping(baidu.com, {'seq': 0, 'ttl': 64, 'timeout': 4, 'size': 56, 'interface': 'usb0', 'src_addr': '', 'unit': 'ms'})
[DEBUG] Socket Interface Binded: usb0
[DEBUG] Function called: send_one_ping({'sock': <socket.socket fd=3, family=AddressFamily.AF_INET, type=SocketKind.SOCK_RAW, proto=1, laddr=('0.0.0.0', 1)>, 'dest_addr': 'baidu.com', 'icmp_id': 62928, 'seq': 0, 'size': 56})
[DEBUG] Destination address: 'baidu.com'
[DEBUG] Destination IP address: 110.242.68.66
[DEBUG] Sent ICMP header: {'type': 8, 'code': 0, 'checksum': 44320, 'id': 62928, 'seq': 0}
[DEBUG] Sent ICMP payload: b'A\xd9\x93\x1a\xd1\xf5\x0e\x85QQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ'
[DEBUG] Function returned: send_one_ping -> None
[DEBUG] Function called: receive_one_ping({'sock': <socket.socket fd=3, family=AddressFamily.AF_INET, type=SocketKind.SOCK_RAW, proto=1, laddr=('0.0.0.0', 1)>, 'icmp_id': 62928, 'seq': 0, 'timeout': 4})
[DEBUG] Timeout time: Tue May 21 17:37:15 2024 (1716284235.8296747)
[DEBUG] Timeout left: 4.00s
[DEBUG] Received time: Tue May 21 17:37:11 2024 (1716284231.8299177))
[DEBUG] Received IP header: {'version': 69, 'tos': 8, 'len': 84, 'id': 1535, 'flags': 0, 'ttl': 48, 'protocol': 1, 'checksum': 5426, 'src_addr': '119.45.164.100', 'dest_addr': '10.16.73.207'}
[DEBUG] Received ICMP header: {'type': 0, 'code': 0, 'checksum': 48709, 'id': 2156, 'seq': 1289}
[DEBUG] Received ICMP payload: b'GkLf\x00\x00\x00\x00\xd7\xa0\n\x00\x00\x00\x00\x00\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !"#$%&\'()*+,-./01234567'
[DEBUG] ICMP ID dismatch. Packet filtered out.
[DEBUG] Timeout left: 4.00s
[DEBUG] Received time: Tue May 21 17:37:11 2024 (1716284231.840332))
[DEBUG] Received IP header: {'version': 69, 'tos': 192, 'len': 204, 'id': 63607, 'flags': 0, 'ttl': 64, 'protocol': 1, 'checksum': 55611, 'src_addr': '10.16.73.207', 'dest_addr': '10.16.73.207'}
[DEBUG] Received ICMP header: {'type': 3, 'code': 3, 'checksum': 25561, 'id': 0, 'seq': 0}
[DEBUG] Received ICMP payload: b'E\x00\x00\xb0\x9e\xdf@\x00@\x11\xf3\x9f\n\x10I\xcf\n\x10I\xcf\x80\xb0\x1d\x08\x00\x9c\xa8kRTPS\x02\x03\x01\x0f\x01\x0f\xaa\xa1\xd7\nN)\x02\x00\x00\x00\x08\x01<\x00\x00\x00\x03\xc7\x00\x00\x03\xc2\x00\x00\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00!\x00\x00\x00\x00\x01\x00\x00\xff\xff\xff\x03\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xc0\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\x08\x01\x1c\x00\x00\x00\x03\xc7\x00\x00\x03\xc2\x00\x00\x00\x00!\x01\x00\x00\x00\x00\x00\x00D\x01\x00\x00\x00\x00\x00\x00\x07\x01\x1c\x00\x00\x00\x03\xc7\x00\x00\x03\xc2\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00N\x01\x00\x00O\\\x01\x00'
[DEBUG] Destination unreachable. (Host='10.16.73.207')
[DEBUG] Function returned: ping -> False
ping 'baidu.com' ... Error
[DEBUG] Function returned: verbose_ping -> None
root@i3:/home/orca/ws# ip r
default via 10.16.73.208 dev usb0 
default via 192.168.55.100 dev l4tbr0 metric 32766 linkdown 
10.1.0.0/16 dev edge0 proto kernel scope link src 10.1.145.38 
10.16.73.192/27 dev usb0 proto kernel scope link src 10.16.73.207 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 
192.168.2.0/23 dev eth0 proto kernel scope link src 192.168.3.11 
192.168.55.0/24 dev l4tbr0 proto kernel scope link src 192.168.55.1 linkdown 
@rty813
Copy link
Author

rty813 commented May 21, 2024

image
From the captured packets, it should have been successful.

@kyan001
Copy link
Owner

kyan001 commented Sep 9, 2024

Sorry for the late response.

  1. For the first attempt, the "Destination unreachable" error might be because the ping3 was not using the correct interface, as the resolved IP address solved does not match the second attempt with the -I usb0 argument.

  2. For the 2nd attempt, although the server responded with an ICMP reply, the ICMP echo reply packet was filtered out due to an ICMP ID mismatch. This might occur because some network devices (such as firewalls or routers) modify the content of ICMP packets, causing the ID to mismatch.

Let me know if you continue to experience this issue.

Kyan

@rty813
Copy link
Author

rty813 commented Sep 9, 2024

However, from the wireshark screenshot, the reply data packet can be captured, and the request/reply is also one-to-one corresponding.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants