详细信息
阿里云提醒您:
如果您对实例或数据有修改、变更等风险操作,务必注意实例的容灾、容错能力,确保数据安全。
如果您对实例(包括但不限于ECS、RDS)等进行配置与数据修改,建议提前创建快照或开启RDS日志备份等功能。
如果您在阿里云平台授权或者提交过登录账号、密码等安全信息,建议您及时修改。
如果源服务器访问目标服务器时出现异常,您可以抓包获取最原始的交互数据进行排查分析。在介绍常用的抓包工具以及如何抓包的详细信息前,请参见以下文档排查和分析问题。
Linux环境中的抓包工具
Linux环境中通常使用TCPDump工具进行抓包和分析,TCPDump工具是所有Linux发行版本预装的数据包抓取和分析工具。有关TCPDump工具的获取和安装方法,请参见。
关于tcpdump命令的说明如下所示(区分大小写)。
1 2 3 4 5 6 7 8 9 10 11 12 |
<span style="box-sizing: border-box; padding-right: 0.1px;">tcpdump [ <span style="box-sizing: border-box; color: #0000cc;">-AbdDefhHIJKlLnNOpqStuUvxX</span><span style="box-sizing: border-box; color: #aa5500;"># ] [ -B buffer_size ]</span></span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">-c</span> count ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">-C</span> file_size ] [ <span style="box-sizing: border-box; color: #0000cc;">-G</span> rotate_seconds ] [ <span style="box-sizing: border-box; color: #0000cc;">-F</span> file ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">-i</span> interface ] [ <span style="box-sizing: border-box; color: #0000cc;">-j</span> tstamp_type ] [ <span style="box-sizing: border-box; color: #0000cc;">-m</span> module ] [ <span style="box-sizing: border-box; color: #0000cc;">-M</span> secret ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">--number</span> ] [ <span style="box-sizing: border-box; color: #0000cc;">-Q</span> <span style="box-sizing: border-box; color: #770088;">in</span>|out|inout ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">-r</span> file ] [ <span style="box-sizing: border-box; color: #0000cc;">-V</span> file ] [ <span style="box-sizing: border-box; color: #0000cc;">-s</span> snaplen ] [ <span style="box-sizing: border-box; color: #0000cc;">-T</span> type ] [ <span style="box-sizing: border-box; color: #0000cc;">-w</span> file ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">-W</span> filecount ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">-E</span> spi@ipaddr algo:secret,... ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">-y</span> datalinktype ] [ <span style="box-sizing: border-box; color: #0000cc;">-z</span> postrotate-command ] [ <span style="box-sizing: border-box; color: #0000cc;">-Z</span> user ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">--time-stamp-precision</span><span style="box-sizing: border-box; color: #981a1a;">=</span>tstamp_precision ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ <span style="box-sizing: border-box; color: #0000cc;">--immediate-mode</span> ] [ <span style="box-sizing: border-box; color: #0000cc;">--version</span> ]</span> <span style="box-sizing: border-box; padding-right: 0.1px;">[ expression ]</span> |
-
-s:用于设置数据包抓取长度。如果-s为0,则表示自动选择合适的长度来抓取数据包。
-
-w:用于将抓包结果导出到文件,而不是在控制台进行分析和打印输出。
-
-i:用于指定需要监听的接口(网卡)。
-
-vvv:用于输出详细的交互数据。
-
expression:是一个正则表达式,用于过滤报文,主要包含如下几类:
-
指定类型的关键字:包括host(主机)、net(网络)和port(端口)。
-
指定传输方向的关键字:包括src(源)、dst(目标)、dst or src(源或目标)和dst and src(源和目标)。
-
指定协议的关键字:包括ICMP、IP、ARP、RARP、TCP和UDP等协议类型。
-
关于tcpdump命令常见用法和示例输出的详细信息。
-
执行以下命令,抓取eth0网卡22端口的交互数据。
1tcpdump -s 0 -i eth0 port 22系统显示类似如下。
123456<span style="box-sizing: border-box; padding-right: 0.1px;">tcpdump: verbose output suppressed, use <span style="box-sizing: border-box; color: #0000cc;">-v</span> or <span style="box-sizing: border-box; color: #0000cc;">-vv</span> <span style="box-sizing: border-box; color: #770088;">for</span> full protocol decode</span><span style="box-sizing: border-box; padding-right: 0.1px;">listening on eth0, link-type EN10MB (Ethernet), capture size <span style="box-sizing: border-box; color: #116644;">65535</span> bytes</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:24:59.414951 IP <span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226.ssh > <span style="box-sizing: border-box; color: #116644;">42</span>.xx.xx.107.43414: Flags [P.], seq <span style="box-sizing: border-box; color: #116644;">442372</span>:442536, ack <span style="box-sizing: border-box; color: #116644;">53</span>, win <span style="box-sizing: border-box; color: #116644;">141</span>, length <span style="box-sizing: border-box; color: #116644;">164</span></span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:24:59.415002 IP <span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226.ssh > <span style="box-sizing: border-box; color: #116644;">42</span>.xx.xx.107.43414: Flags [P.], seq <span style="box-sizing: border-box; color: #116644;">442536</span>:442700, ack <span style="box-sizing: border-box; color: #116644;">53</span>, win <span style="box-sizing: border-box; color: #116644;">141</span>, length <span style="box-sizing: border-box; color: #116644;">164</span></span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:24:59.415052 IP <span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226.ssh > <span style="box-sizing: border-box; color: #116644;">42</span>.xx.xx.107.43414: Flags [P.], seq <span style="box-sizing: border-box; color: #116644;">442700</span>:442864, ack <span style="box-sizing: border-box; color: #116644;">53</span>, win <span style="box-sizing: border-box; color: #116644;">141</span>, length <span style="box-sizing: border-box; color: #116644;">164</span></span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:24:59.415103 IP <span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226.ssh > <span style="box-sizing: border-box; color: #116644;">42</span>.xx.xx.107.43414: Flags [P.], seq <span style="box-sizing: border-box; color: #116644;">442864</span>:443028, ack <span style="box-sizing: border-box; color: #116644;">53</span>, win <span style="box-sizing: border-box; color: #116644;">141</span>, length <span style="box-sizing: border-box; color: #116644;">164</span></span> -
执行以下命令,抓取eth1网卡发送给22端口的交互数据,并在控制台输出详细交互信息。
1tcpdump -s 0 -i eth1 -vvv port 22系统显示类似如下。
12345<span style="box-sizing: border-box; padding-right: 0.1px;">tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size <span style="box-sizing: border-box; color: #116644;">65535</span> bytes</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:24:20.991006 IP (tos 0x10, ttl <span style="box-sizing: border-box; color: #116644;">64</span>, id <span style="box-sizing: border-box; color: #116644;">22747</span>, offset <span style="box-sizing: border-box; color: #116644;">0</span>, flags [DF], proto TCP (6), length <span style="box-sizing: border-box; color: #116644;">316</span>)</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226.ssh > <span style="box-sizing: border-box; color: #116644;">42</span>.xx.xx.107.43414: Flags [P.], cksum 0x2504 (incorrect <span style="box-sizing: border-box; color: #0000cc;">-</span>> 0x270d), seq <span style="box-sizing: border-box; color: #116644;">133624</span>:133900, ack <span style="box-sizing: border-box; color: #116644;">1</span>, win <span style="box-sizing: border-box; color: #116644;">141</span>, length <span style="box-sizing: border-box; color: #116644;">276</span></span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:24:20.991033 IP (tos 0x0, ttl <span style="box-sizing: border-box; color: #116644;">53</span>, id <span style="box-sizing: border-box; color: #116644;">2348</span>, offset <span style="box-sizing: border-box; color: #116644;">0</span>, flags [DF], proto TCP (6), length <span style="box-sizing: border-box; color: #116644;">92</span>)</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">42</span>.xx.xx.107.43414 > <span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226.ssh: Flags [P.], cksum 0x4759 (correct), seq <span style="box-sizing: border-box; color: #116644;">1</span>:53, ack <span style="box-sizing: border-box; color: #116644;">129036</span>, win <span style="box-sizing: border-box; color: #116644;">15472</span>, length <span style="box-sizing: border-box; color: #116644;">52</span></span> -
执行以下命令,抓取eth1网卡发送至指定IP地址的PING交互数据,并输出详细交互数据。
1tcpdump -s 0 -i eth1 -vvv dst 223.xx.xx.5 and icmp系统显示类似如下。
123456789<span style="box-sizing: border-box; padding-right: 0.1px;">tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size <span style="box-sizing: border-box; color: #116644;">65535</span> bytes</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:26:00.368958 IP (tos 0x0, ttl <span style="box-sizing: border-box; color: #116644;">64</span>, id <span style="box-sizing: border-box; color: #116644;">0</span>, offset <span style="box-sizing: border-box; color: #116644;">0</span>, flags [DF], proto ICMP (1), length <span style="box-sizing: border-box; color: #116644;">84</span>)</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226 > public1.alidns.com: ICMP <span style="box-sizing: border-box; color: #3300aa;">echo</span> request, id <span style="box-sizing: border-box; color: #116644;">55097</span>, seq <span style="box-sizing: border-box; color: #116644;">341</span>, length <span style="box-sizing: border-box; color: #116644;">64</span></span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:26:01.369996 IP (tos 0x0, ttl <span style="box-sizing: border-box; color: #116644;">64</span>, id <span style="box-sizing: border-box; color: #116644;">0</span>, offset <span style="box-sizing: border-box; color: #116644;">0</span>, flags [DF], proto ICMP (1), length <span style="box-sizing: border-box; color: #116644;">84</span>)</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226 > public1.alidns.com: ICMP <span style="box-sizing: border-box; color: #3300aa;">echo</span> request, id <span style="box-sizing: border-box; color: #116644;">55097</span>, seq <span style="box-sizing: border-box; color: #116644;">342</span>, length <span style="box-sizing: border-box; color: #116644;">64</span></span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:26:02.371058 IP (tos 0x0, ttl <span style="box-sizing: border-box; color: #116644;">64</span>, id <span style="box-sizing: border-box; color: #116644;">0</span>, offset <span style="box-sizing: border-box; color: #116644;">0</span>, flags [DF], proto ICMP (1), length <span style="box-sizing: border-box; color: #116644;">84</span>)</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226 > public1.alidns.com: ICMP <span style="box-sizing: border-box; color: #3300aa;">echo</span> request, id <span style="box-sizing: border-box; color: #116644;">55097</span>, seq <span style="box-sizing: border-box; color: #116644;">343</span>, length <span style="box-sizing: border-box; color: #116644;">64</span></span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">20</span>:26:03.372181 IP (tos 0x0, ttl <span style="box-sizing: border-box; color: #116644;">64</span>, id <span style="box-sizing: border-box; color: #116644;">0</span>, offset <span style="box-sizing: border-box; color: #116644;">0</span>, flags [DF], proto ICMP (1), length <span style="box-sizing: border-box; color: #116644;">84</span>)</span><span style="box-sizing: border-box; padding-right: 0.1px;"><span style="box-sizing: border-box; color: #116644;">172</span>.xx.xx.226 > public1.alidns.com: ICMP <span style="box-sizing: border-box; color: #3300aa;">echo</span> request, id <span style="box-sizing: border-box; color: #116644;">55097</span>, seq <span style="box-sizing: border-box; color: #116644;">344</span>, length <span style="box-sizing: border-box; color: #116644;">64</span></span> -
执行以下命令,抓取系统内所有接口数据并保存到指定文件。
1tcpdump -i any -s 0 -w test.cap说明:您如果通过
cat
、vim
命令查看保存的文件,都会显示为乱码。此时您可以执行tcpdump -r test.cap
命令,查看信息。或者您可以使用Wireshark工具查看信息。系统显示类似如下。
1tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size 65535 bytes
Windows环境中的抓包工具
Windows环境中一般使用免费的较为流行的Wireshark开源工具进行抓包和分析。请参见,获取并安装Wireshark工具,然后进行抓包。
-
安装并打开Wireshark工具。
-
依次单击捕获>选项。
-
在Wireshark 捕获接口界面中,根据接口名称或对应的IP地址选择需要进行抓包的网卡,然后单击开始。
-
抓取足量数据包后,依次单击捕获>停止。
-
依次单击文件>保存,将抓包结果保存到指定文件。
抓包分析流程
出现异常时,您可以抓取数据包进行分析。抓包时请确保从源服务器和目标服务器同时并发操作,以便进行对比分析,具体操作步骤如下:
-
确认源服务器和目标服务器进行数据交互通过的网卡。
-
利用前文所述工具,从源服务器对目标服务器地址的目标端口和网卡进行抓包,或者进行完整抓包。
-
利用前文所述工具,从目标服务器对源服务器地址和网卡进行抓包,或者进行完整抓包,然后进行分析。
-