有没有办法查看在TCP端口上侦听的进程是否收到消息?


7

根据tcpdump,我的服务器收到以下TCP数据包:

12:52:29.603233 00:19:e2:9e:df:f0 
00:16:3e:6a:25:3f, ethertype IPv4 (0x0800), length 74: 10.10.10.65.38869 
192.168.215.82.22: Flags [S], seq 567054335, win 5840, options [mss 1460,sackOK,TS val 2096335479 ecr 0,nop,wscale 0], length 0

如上所示,这是到TCP端口22的TCP SYN数据包,在我的情况下,该数据包侦听a sshd。我想看看这个TCP数据包是否到达sshd进程。我猜一个选择是sshd在调试模式下重启。但是,是否还有其他聪明的工具/方法可以查看在TCP端口上侦听的进程是否收到消息?如果是TCP SYN数据包,我想这是内核TCP / IP堆栈,它将发送TCP SYN + ACK,而不是sshd

Answers:


14

但是,是否还有其他聪明的工具/方法可以查看在TCP端口上侦听的进程是否收到消息?

您可以使用strace-e trace=network。这是在接受TCP连接,接收HTTP请求,发送HTTP响应并关闭连接时显示的内容:

$ strace -v -f -e trace=network -p `cat logs/my_server.pid`
Process 2361 attached with 44 threads - interrupt to quit
[pid  2422] accept(11, {sa_family=AF_INET, sin_port=htons(56289), sin_addr=inet_addr("172.30.1.60")}, [16]) = 14
[pid  2422] getsockname(14, {sa_family=AF_INET, sin_port=htons(7754), sin_addr=inet_addr("172.30.1.60")}, [16]) = 0
[pid  2422] setsockopt(14, SOL_TCP, TCP_NODELAY, [1], 4) = 0
[pid  2422] setsockopt(14, SOL_SOCKET, SO_KEEPALIVE, [1], 4) = 0
[pid  2422] getsockopt(14, SOL_SOCKET, SO_OOBINLINE, [515004615020773376], [4]) = 0
[pid  2388] recvfrom(14, "GET /OPEN_", 10, MSG_PEEK, NULL, NULL) = 10
[pid  2388] recvfrom(14, "GET /OPEN_SESSION?LOGIN=HAS_ADMI"..., 4096, 0, NULL, NULL) = 246
[pid  2388] sendto(14, "HTTP/1.1 200 OK\r\nServer: MY_SER"..., 192, 0, NULL, 0) = 192
[pid  2388] sendto(14, "<?xml version='1.0' encoding = '"..., 680, 0, NULL, 0) = 680
[pid  2361] --- SIGIO (I/O possible) @ 0 (0) ---
[pid  2388] recvfrom(14, "", 4096, 0, NULL, NULL) = 0
[pid  2388] shutdown(14, 2 /* send and receive */) = 0

并带有颜色:strace $CMD 2>&1 > /dev/null | vim -c ':set syntax=strace' -
Pablo A
By using our site, you acknowledge that you have read and understand our Cookie Policy and Privacy Policy.
Licensed under cc by-sa 3.0 with attribution required.