1SC_SPEEDTRAP(1)           BSD General Commands Manual          SC_SPEEDTRAP(1)
2

NAME

4     sc_speedtrap — scamper driver to resolve aliases for a set of IPv6 inter‐
5     faces.
6

SYNOPSIS

8     sc_speedtrap [-I] [-a addressfile] [-A aliasfile] [-l logfile]
9                  [-o outfile] [-p port] [-s stop] [-S skipfile]
10                  [-U unix-socket]
11
12     sc_speedtrap [-d dump] [file ...]
13

DESCRIPTION

15     The sc_speedtrap utility provides the ability to connect to a running
16     scamper(1) instance and have resolve a set of IPv6 addresses for aliases
17     using the "speedtrap" technique.  sc_speedtrap induces each address to
18     send fragmented ICMP echo replies, with the goal of obtaining an incre‐
19     menting Identifier (ID) field in the fragmentation header.  If two
20     addresses are aliases, they will return ICMP echo replies with a monoton‐
21     ically increasing value in the ID field because the ID field is imple‐
22     mented as a counter shared amongst all interfaces.  sc_speedtrap imple‐
23     ments a scalable algorithm to quickly determine which addresses are
24     aliases.  For further information about the algorithm is found in the
25     "see also" section.  The supported options to sc_speedtrap are as fol‐
26     lows:
27
28     -a addressfile
29             specifies the name of the input file which consists of a sequence
30             of IPv6 addresses to resolve for aliases, one address per line.
31
32     -A aliasfile
33             specifies the name of an output file which will receive pairs of
34             aliases, one address-pair per line.
35
36     -d dump
37             specifies the number identifying an analysis task to conduct.
38             Valid dump numbers are 1-3.  See the examples section.
39
40     -I      specifies that the addressfile contains only interfaces known to
41             send fragmentation headers containing incrementing values.
42
43     -l logfile
44             specifies the name of a file to log output from sc_speedtrap gen‐
45             erated at run time.
46
47     -o outfile
48             specifies the name of the output file to be written.  The output
49             file will use the warts format.
50
51     -p port
52             specifies the port on the local host where scamper(1) is accept‐
53             ing control socket connections.
54
55     -s stop
56             specifies the step at which sc_speedtrap should halt.  The avail‐
57             able steps are "classify", "descend", "overlap", "descend2",
58             "candidates", and "ally".
59
60     -S skipfile
61             specifies the name of an input file which contains known aliases
62             that do not need to be resolved, one address-pair per line.
63
64     -U unix-socket
65             specifies the name of a unix domain socket where scamper(1) is
66             accepting control socket connections.
67

EXAMPLES

69     Given a set of IPv6 addresses contained in a file named addressfile.txt
70     and a scamper process listening on port 31337 configured to probe at 30
71     packets per second started as follows:
72
73           scamper -P 31337 -p 30
74
75     the following command will resolve the addresses for aliases, store the
76     raw measurements in outfile1.warts, and record the interface-pairs that
77     are aliases in aliases.txt:
78
79           sc_speedtrap -p 31337 -a addressfile.txt -o outfile1.warts -A
80           aliases.txt
81
82     The next example is useful when inferring aliases from multiple vantage
83     points.  Given the output of aliases.txt from a previous measurement, the
84     following will resolve the addressfile for aliases, skipping those in
85     aliases.txt, and appending the new aliases to aliases.txt:
86
87           sc_speedtrap -p 31337 -a addressfile.txt -o outfile2.warts -A
88           aliases.txt -S aliases.txt
89
90     To obtain a transitive closure of routers from an input warts file:
91
92           sc_speedtrap -d 1 outfile1.warts
93
94     To obtain a list of the interfaces probed and their IPID behaviour:
95
96           sc_speedtrap -d 2 outfile1.warts
97
98     To obtain statistics of how many probes are sent in each stage, and how
99     long the stage takes:
100
101           sc_speedtrap -d 3 outfile1.warts
102

SEE ALSO

104     M. Luckie, R. Beverly, W. Brinkmeyer, and k. claffy, Speedtrap: Internet-
105     scale IPv6 Alias Resolution, Proc. ACM/SIGCOMM Internet Measurement
106     Conference 2013.  scamper(1), sc_ally(1), sc_ipiddump(1),
107     sc_wartsdump(1), sc_warts2text(1), sc_warts2json(1),
108

AUTHORS

110     sc_speedtrap is written by Matthew Luckie <mjl@luckie.org.nz>.
111
112BSD                             August 18, 2013                            BSD
Impressum